Тёмный

Back to the Basics: How to Create Effective Information Security Policies 

RSA Conference
Подписаться 92 тыс.
Просмотров 1,2 тыс.
50% 1

Chuck Kesler, Chief Information Security Officer, Pendo.io
One of the most dreaded tasks in information security has to be developing policies. While policies are needed to make technical and physical security controls effective, many policies end up being poorly written, misunderstood and often ignored by the workforce. This session will review best practices and simple approaches that can be used to create and implement more effective information security policies.Learning Objectives:1: Review the foundational steps and principles required to create effective policies.2: Understand how to align policies with the organization's internal and external environment and requirements.3: Discuss a process for developing and implementing policies to ensure that they are understood and adopted.Pre-Requisites:A general understanding of virtualization technologies would be helpful but not mandatory.

Наука

Опубликовано:

 

8 июн 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии    
Далее
How to Write Information Security Policy
27:45
Просмотров 15 тыс.
Information Security Policies - Development
51:21
Просмотров 37 тыс.
Step by Step Approach to Comply by SOC 2
1:26:42
Просмотров 1,4 тыс.
Policies, Standards, Procedures, and Guidelines
5:59
Lost Vape Ursa Pocket
0:17
Просмотров 89 тыс.
#miniphone
0:16
Просмотров 1,6 млн
Избранное печатает...
0:11
Просмотров 109 тыс.