
Policies - The power to control and monitor an ISMS
How policies not only give you control, but also significantly increase the efficiency and security of your IT infrastructure
Topic
Legislation, standards, regulationsGovernance, Riskmanagement and Compliance
When & Where
Details
Format:
Management lecture
Session description
In an increasingly digital world, information security management systems (ISMS) are essential to ensure the integrity and security of sensitive data. But how do we ensure that these systems work efficiently and purposefully? The key is the correct use of policies. In this lecture, we will examine the central role of security policies within an ISMS and show how they can be used for control and monitoring.
From the definition of general security processes to the concrete implementation and back to a comprehensive overview - we go through the policy cycle and show how policies serve as a control tool for management. They are the basis for security requirements and enable effective self-assessment through GAP analyses. They also offer management-friendly evaluations of the imp ...
From the definition of general security processes to the concrete implementation and back to a comprehensive overview - we go through the policy cycle and show how policies serve as a control tool for management. They are the basis for security requirements and enable effective self-assessment through GAP analyses. They also offer management-friendly evaluations of the imp ...