Last day to save $500 for SANS San Diego 2013

OnSite

MGT519: Information Security Policy In-Depth

This course is the most in-depth coverage of information security policy ever developed. By the end of the course your head will be spinning. During this intensive two-day security-policy course, you will learn what security policy is (positive and negative tone); How to create consistent policies; how to balance the level of specificity to the problem at hand; the role of policy, awareness and training; the SMART approach to security policy development and assessment.

  • Policy Establishes Bounds for Behavior
  • Policy Empowers Users to do the Right Thing
  • Should and Shall, Guidelines and Policy
  • ISMS as Governing Policy
  • Policy versus Procedure
  • Policy Needs Assessment Process
  • Organizational Assumptions, Beliefs and Values (ABVs)
  • Relationship of Mission Statement to Policy
  • Organizational Culture
  • Using the Principles of Psychology to Implement Policy
  • Applying the SMART to Policy
  • How Policy Protects People, Organizations and Information
  • Case Study, the Process to Handle a New Risk (Sexting)
  • Policy Header Components and How to Use Them
  • Issue Specific Policies
  • Behavior Related Polices, Acceptable Use, Ethics
  • Warning Banners
  • Policy Development Process
  • Policy Review and Assessment Process
  • Wrapup, the Six Golden Nuggets of Policy

Course Syllabus
 
 
  Testimonial

"I never realized there is so much to know about security policy."

"Any security manager, anyone assigned to review, write, assess or support security policy and procedure can benefit from this course."

 
  Laptop Required

Pencil and paper would suffice for the labs, but we recommend a laptop with a word processor. A CDROM is also highly recommended.

If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org.

 
  Who Should Attend

  • Managers with security program responsibilities
  • Security professionals with policy development and assessment duties
  • Anyone who serves on a policy steering committee

 

Author Statement

Author Statement

I have been told, "do this according to your security policy," or "you should have this in your security policy" so many times, but no one ever said how to create a policy. In 1997, an instructor in a class I was taking said that and I remember thinking, "alrighty then, I am going to figure this out." As a result, I started a research project with SANS and a colleague, John Ritter, to determine the steps to consistently develop good, and the right, policy and then get it approved. We do not claim to have all the answers, but this is the most comprehensive security policy training available. A lot of material can be found on the web if you are skilled at targeted Google searches, but I have been researching, improving, and adding to the material for a long time, and frankly time is money. In two course days, the diligent student will become an expert on information security policy.

- Stephen Northcutt