home_banner `

Content Icon

Tips for Security Policy/Standard Success

July 9, 2018 | Ask-An-Expert | Security Policies and Strategy | By Kevin Beaver, IANS Faculty

No security policy should be established without first performing a comprehensive risk assessment and ensuring everything ties back to business goals. In this Ask-an-Expert written response, IANS Faculty Kevin Beaver offers a step-by-step guide for putting successful security policies/standards in place.


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Poll: Best Ways to Encourage PAM Tool Usage

What statements or phrases can help increase adoption of tools like Thycotic Secret Server? In this Viewpoints report, IANS Faculty Josh More, Adam Shostack and Jason Gillam offer some tried-and-true strategies.

Information Security Job Description Templates (Updated)

With the information security workforce shortage projected to reach 2-3 million over the next few years, organizations are putting a greater emphasis on their recruiting process to better fill out their security teams. Use these sample infosec job descriptions to set the foundation for role expectations and attract the most highly qualified professionals to your organization. 

Customer-Infosec Advisory Council Charter and Bylaws Template

This template documents a charter and bylaws for a customer-infosec advisory council designed to facilitate the sharing of company infosec capabilities and roadmaps with customers, and customer experiences and concerns with the company.

Take a Clear-Eyed Approach to Communicating in China

Should corporate employees (Chinese nationals living and working in China) conduct business using Chinese communications platforms like WeChat and QQ? In this Ask-an-Expert written response, IANS Faculty Aaron Turner explains the downsides and offers key recommendations.