SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAs cyber threats accelerate, Information Systems Security Policies (ISSP) are more critical than ever.
As cyber threats accelerate, Information Systems Security Policies (ISSP) are more critical than ever. An ISSP is a strategic document that outlines the principles, objectives, and security measures for an organization’s information systems. It contains high-level, mandatory statements used to define a course of action to govern behavior and address specific systems, methods, or techniques and helps ensure data protection, business continuity, and compliance with legal and regulatory requirements.
A well-designed security policy is key to navigating evolving threats and emerging regulations such as the NIS2 Directive and the Cyber Resilience Act (CRA). Requirements can be sector specific. In healthcare, policies must address compliance requirements and patient data confidentiality, while in finance, policies often focus on fraud prevention and transaction monitoring.
In SANS LDR512: Security Leadership Essentials for Managers, we refer to the Policy Pyramid. Every company has different terminology for the sets of instructions found in the policy pyramid. One large, not-for-profit organization defined the policy pyramid with these terms (Figure 1) Other organizations may decide to use only a few of these instruction sets to govern organizational behaviour. Others might use different terminology.
Effective ISSPs typically include items such as the ones listed below. Specific components may vary by organizations or industry requirements.
It is important to ensure that outdated policies are updated in alignment with the realities of today's threat landscape. Ransomware, supply chain attacks, and artificial intelligence (AI) threats are increasingly prevalent, especially as we’ve embraced a new way of working with cloud-based remote environments. In turn, our policies must address Software-as-a-Service (SaaS), Bring-Your-Own-Device (BYOD), and hybrid work structures.
Consider a scenario where a company still relies on perimeter-based defenses without accounting for remote work. Such a policy would fail to address risks introduced by unsecured home networks or personal devices accessing corporate data. Most organizations have now built environments based on Zero-Trust Architecture (ZTA). This shift marks a move from perimeter-based to identity-centric security. Organizations utilize more third parties, and as a result modern policy must include vendor risk assessments and contractual security requirements to ensure supply chain integrity.
As previously mentioned, the regulatory landscape has also changed. We have a set of new or updated regulatory requirements such as NIS2, CRA, and sector-specific requirements which must be addressed. NIS2 imposes stricter obligations on risk management, incident reporting, and governance, with high penalties for non-compliance. The CRA requires to focus on secure-by-design products, impacting manufacturers and software providers. As a result, policies must now include supply chain and product lifecycle considerations.
Lastly, we also have new and changing technology. We see the change in cryptography with quantum computing, and with the usage of AI. In the case of quantum computing, we will need to prepare for post-quantum encryption. For AI, we will need to add requirements on what data can be used on public or private Generative AI (GenAI) solutions. By now, most organizations have formally established guidance on the usage of AI, or a responsible usage of AI policy. If not, they should do so as soon as possible.
Organizations evolve in their cyber and information security practices through a series of maturity stages. These stages reflect how well these policies are defined, implemented, and integrated into business operations. In traditional maturity style, we could observe 5 levels.
Figure 2 – Policy Maturity
Cybersecurity policies are no longer static documents; they are dynamic and evolve with the threat landscape and business needs. Writing and implementing effective policies requires a strategic, people-centered, and tech-savvy approach.
An organization’s cybersecurity measures must support its mission. Policies should reflect business priorities, regulatory requirements, and risk tolerance. Involving leadership early ensures alignment and accountability.
Before drafting policies, assess your assets, threats, and vulnerabilities. Use threat modeling to prioritize what needs protection. Start by reviewing your current policy against recent incidents and regulatory updates. Engage your team in a policy refresh workshop to identify gaps and opportunities.
Develop concise and understandable for all employees, avoid ambiguous terms like “shall”; use clear directives such as “must” or “must not”.
Creating a policy isn’t enough. Train employees regularly using engaging that fit in the organizations culture and style. Foster a culture where security is everyone’s responsibility.
Policies are living documents. Use metrics and audits to assess effectiveness. Update regularly based on new threats, business changes, and lessons learned from incidents. Share what you have learned, and why you are updating your policies.
Writing policies from scratch can be time-consuming, error-prone, and risky. Established frameworks and templates—like those from NIST, ISO/IEC, or CIS—are built on industry best practices, legal standards, and real-world experience. By leveraging these resources, you save time, ensure compliance, and reduce the chance of overlooking critical elements.
The SANS Policy Library created in partnership with the Cyber Risk Foundation (CRF) offers a comprehensive set of customizable templates aligned with industry frameworks like NIST, ISO/IEC, and CIS. Customizing proven templates to fit your organization’s needs is far more efficient than starting from zero. It allows you to focus on implementation and culture, rather than wording and structure. Consider using AI tools to assist in drafting policies—just ensure thorough review before adoption.
A modern security policy is not just a compliance document—it’s a cornerstone of cyber resilience. If you're ready to deepen your understanding of cybersecurity governance, risk management, and leadership best practices, explore SANS LDR512: Security Leadership Essentials for Managers. This course provides the frameworks, tools, and real-world insights you need to lead with confidence in today’s complex environment.
With 20+ years of experience and holder of multiple certifications, Jan is a specialist in security strategy, compliance, and risk. In class, he helps students develop communication skills needed to explain IT security issues to non-technical audiences.
Read more about Jan D'Herdt