Many security practitioners will find, at some point in their career, that the Chief Information Security Officer (CISO) or Head of Security will hand them a folder and say, “I need you to review the Information Security Policy for the ISO audit...”
By training with me, you’ll know exactly what to do and how to implement new policies and annual updates successfully, without crying into your cornflakes.
Reduce the impact of malicious behaviour on global businesses by empowering thousands of Information Security practitioners with the confidence, knowledge, and tools to apply policies and advanced Governance, Risk Management, and Compliance (GRC) methodologies to fortify their organisations against unmitigated protection gaps.
Given that most security breaches stem from the negligent actions of business employees, it's crucial that we communicate better with our staff.
Well-written bespoke security policies are the most straightforward and cost-effective way to convey organisational expectations around behaviour and provide a guide to staff when they interact with information.
Most security teams assign the responsibility of writing their policies to either their security managers or the GRC Analysts. Organisations with many policies and procedures may even employ a dedicated writer to communicate operational security requirements with bespoke policies targeting the risk of human interaction with Information Systems.
As an Information Security Practitioner trained to develop and implement policies and procedures, you will be at the forefront of the security department.
You'll collaborate strategically with the CISO and the security architects, managers, and leaders, but you'll also work closely with application development teams, business executives, cloud operations specialists, and systems administrators.
Products section