October 5, 2018 | Tools & Templates | Security Policies and Strategy
Securing the business after a major international acquisition is no easy feat. In this Ask-an-Expert written response, IANS Faculty Rich Guida steps through the process and offers tips for ensuring both staff and tool integration goes smoothly.
This template for a typical acceptable use policy may be customized to suit a variety of organizations.
Personal usage of IT equipment and services continues to be a big problem in many large organizations. In this Ask-an-Expert written response, IANS Faculty Kevin Beaver details what can go wrong when employees use personal email at work and explains the importance of using both policy and technical controls to address the issue.
This template is designed to be used to evaluate vendors performing a security program maturity assessment.