Stuart Wedge Profile Picture

Learn how to write Information Security Policies from the PolicyWizard!

Many security practitioners will find, at some point in their career, that the Chief Information Security Officer (CISO) or Head of Security will hand them a folder and say, “I need you to review the Information Security Policy for the ISO audit...”

By training with me, you’ll know exactly what to do and how to implement new policies and annual updates successfully, without crying into your cornflakes.

Mission Statement

Reduce the impact of malicious behaviour on global businesses by empowering thousands of Information Security practitioners with the confidence, knowledge, and tools to apply policies and advanced Governance, Risk Management, and Compliance (GRC) methodologies to fortify their organisations against unmitigated protection gaps.

Given that most security breaches stem from the negligent actions of business employees, it's crucial that we communicate better with our staff.

Well-written bespoke security policies are the most straightforward and cost-effective way to convey organisational expectations around behaviour and provide a guide to staff when they interact with information.

Most security teams assign the responsibility of writing their policies to either their security managers or the GRC Analysts. Organisations with many policies and procedures may even employ a dedicated writer to communicate operational security requirements with bespoke policies targeting the risk of human interaction with Information Systems.

As an Information Security Practitioner trained to develop and implement policies and procedures, you will be at the forefront of the security department.

You'll collaborate strategically with the CISO and the security architects, managers, and leaders, but you'll also work closely with application development teams, business executives, cloud operations specialists, and systems administrators.

Products section

Featured products

  • Free

Security Policy Cheat Sheet

  • Download

Get your free copy of the freshly updated version 4.0 of the Security Policy Cheat Sheet! Use it as a guide to help you start writing security policies for your organisation. Did I mention it's free?

  • £575

Information Security Policy Writer

  • Course

The ISPW course is for security managers, and GRC practitioners who want to use policy as a tool to build security programs. It's a complete solution for identifying, assessing, recording, communicating, and mitigating security risks. We focus on policies but teach all necessary GRC skills. You'll learn all you need to provide a defined, monitored, and controlled area where you can operate without interference.

  • Waitlist

GRC Job Ready - 6 Months Coaching

  • Course

A 1:1 coaching program designed for people transitioning into GRC who need a white glove service. You get: ✅ A personalised GRC Job Ready Roadmap ✅ Access to my Policy & GRC course ✅ Access to my premium community ✅ Access to my DMs ✅ 1:1 coaching

  • £3,575

The Congredior Method: 12-month Coaching Program

  • Course

The Congredior Method is a 12-month coaching program designed to help cybersecurity managers and practitioners improve their security communications through an innovative methodology. This program serves as a leadership development system for cybersecurity managers seeking to drive change rather than merely react to it. Each session is scheduled for one hour on a one-to-one basis with Stuart Wedge.