19 min

Episode 10 - Information Security Policies Security Simplified

    • Technology

The next installment in the Information Security Governance Simplified Series.

After covering the definition of information security governance (Ep. 7), the importance of aligning governance with the organization's mission (Ep. 8), and information security roles and responsibilities (Ep. 9), Ryan and Evan tackle information security policies in this episode (Ep. 10).

- What are policies used for?
- Who approves policies and policy changes?
- Who maintains policies?
- Which policies are considered "standard" policies?
- Policy status tracking.

Information security policies are critical to the success of an information security program, BUT only if they're done and used properly.

The next installment in the Information Security Governance Simplified Series.

After covering the definition of information security governance (Ep. 7), the importance of aligning governance with the organization's mission (Ep. 8), and information security roles and responsibilities (Ep. 9), Ryan and Evan tackle information security policies in this episode (Ep. 10).

- What are policies used for?
- Who approves policies and policy changes?
- Who maintains policies?
- Which policies are considered "standard" policies?
- Policy status tracking.

Information security policies are critical to the success of an information security program, BUT only if they're done and used properly.

19 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
The Neuron: AI Explained
The Neuron
Dwarkesh Podcast
Dwarkesh Patel
TED Radio Hour
NPR