Develop and Deploy Security Policies

Enhance your overall security posture with a defensible and prescriptive policy suite.

Book This Workshop

Disregarding security policies can lead to:

  • Informal, ad hoc security policies (if any).
  • Lack of compliance and accountability with current policies.
  • Out-of-date and irrelevant policies.
  • Challenges preparing for an audit of security policies.

Using Info-Tech’s pre-developed templates and tools will:

  • Save time and money in developing and deploying effective security policies while minimizing security risks.
  • Effectively communicate and train users on complying with new security policies.

Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Book Now

Member Rating

9.7/10
Overall Impact

$17,968
Average $ Saved

19
Average Days Saved

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

Read what our members are saying

Module 1: Define the Security Policy Program

The Purpose

  • Define the security policy development program.
  • Formalize a governing security policy lifecycle.

Key Benefits Achieved

  • Understanding the current state of policies within your organization.
  • Prioritizing list of security policies for your organization.
  • Being able to defend policies written based on business requirements and overarching security needs.
  • Leveraging an executive champion to help policy adoption across the organization.
  • Formalizing the roles, responsibilities, and overall mission of the program.

Activities: Outputs:
1.1 Understand the current state of security policies.
1.2 Align your security policies to the Info-Tech framework for compliance.
1.3 Understand the relationship between policies and other documents.
1.4 Prioritize the development of security policies.
1.5 Discuss strategies to leverage stakeholder support.
1.6 Plan to communicate with all stakeholders.
1.7 Develop the security policy lifecycle.
  • Prioritized list of required security policies
  • Security policy charter

Module 2: Develop the Security Policy Suite

The Purpose

  • Develop a comprehensive suite of security policies that are relevant to the needs of the organization.

Key Benefits Achieved

  • Time, effort, and money saved by developing formally documented security policies with input from Info-Tech’s subject-matter experts.

Activities: Outputs:
2.1 Discuss organizational risks and drivers that must be addressed by policies.
2.2 Develop and customize security policies.
  • Security policies (approx. 9)

Module 3: Develop the security policy suite (continued)

The Purpose

  • Develop a comprehensive suite of security policies that are relevant to the needs of the organization.

Key Benefits Achieved

  • Time, effort, and money saved by developing formally documented security policies with input from Info-Tech’s subject-matter experts.

Activities: Outputs:
3.1 Discuss organizational risks and drivers that must be addressed by policies (continued).
3.2 Develop and customize security policies (continued).
3.3 Discuss a plan to submit policies for approval.
  • Security policies (approx. 9)

Module 4: Implement Security Policy Program

The Purpose

  • Ensure policies and requirements are communicated with end users, along with steps to comply with the new security policies.
  • Improve compliance and accountability with security policies.
  • Plan for regular review and maintenance of the security policy program.

Key Benefits Achieved

  • Streamlined communication of the policies to users.
  • Improved end user compliance with policy guidelines and be better prepared for audits.
  • Incorporate security policies into daily schedule, eliminating disturbances to productivity and efficiency.

Activities: Outputs:
4.1 Discuss organizational risks and drivers that must be addressed by policies (continued).
4.2 Develop and customize security policies (continued).
4.3 Discuss a plan to submit policies for approval.
  • Policy communication plan.
  • Security awareness and training program development tool.
  • Security policy assessment tool.
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171