19 min

Episode 10 - Information Security Policies Security Simplified

    • Technology

The next installment in the Information Security Governance Simplified Series.

After covering the definition of information security governance (Ep. 7), the importance of aligning governance with the organization's mission (Ep. 8), and information security roles and responsibilities (Ep. 9), Ryan and Evan tackle information security policies in this episode (Ep. 10).

- What are policies used for?
- Who approves policies and policy changes?
- Who maintains policies?
- Which policies are considered "standard" policies?
- Policy status tracking.

Information security policies are critical to the success of an information security program, BUT only if they're done and used properly.

The next installment in the Information Security Governance Simplified Series.

After covering the definition of information security governance (Ep. 7), the importance of aligning governance with the organization's mission (Ep. 8), and information security roles and responsibilities (Ep. 9), Ryan and Evan tackle information security policies in this episode (Ep. 10).

- What are policies used for?
- Who approves policies and policy changes?
- Who maintains policies?
- Which policies are considered "standard" policies?
- Policy status tracking.

Information security policies are critical to the success of an information security program, BUT only if they're done and used properly.

19 min

Top Podcasts In Technology

TikTok
Catarina Vieira
The Instagram Stories - Social Media News
The Instagram Stories, Daniel Hill
Lex Fridman Podcast
Lex Fridman
Acquired
Ben Gilbert and David Rosenthal
Indie Hackers
Courtland Allen and Channing Allen
iOS 14
Donald Riebe