- Employees are not paying attention to policies. Awareness and understanding of what the security policy’s purpose is, how it benefits the organization, and the importance of compliance are overlooked when policies are distributed.
- Informal, un-rationalized, ad hoc policies do not explicitly outline responsibilities, are rarely comprehensive, and are difficult to implement, revise, and maintain.
- Data breaches are still on the rise and security policies are not shaping good employee behavior or security-conscious practices.
- Adhering to security policies is rarely a priority to users as compliance often feels like an interference to daily workflow. For a lot of organizations, security policies are not having the desired effect.
Our Advice
Critical Insight
- Creating good policies is only half the solution. Having a great policy management lifecycle will keep your policies current, effective, and compliant.
- Policies must be reasonable, auditable, enforceable, and measurable. If the policy items don’t meet these requirements, users can’t be expected to adhere to them. Focus on developing policies to be quantified and qualified for them to be relevant.
Impact and Result
- Save time and money using the templates provided to create your own customized security policies mapped to the Info-Tech framework, which incorporates multiple industry best-practice frameworks (NIST, ISO, SOC2SEC, CIS, PCI, HIPAA).
Member Testimonials
After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.
9.6/10
Overall Impact
$20,514
Average $ Saved
19
Average Days Saved
Client
Experience
Impact
$ Saved
Days Saved
Milliman, Inc.
Guided Implementation
10/10
$13,700
5
Petar was amazing. He was efficient, had a wealth of knowledge and provided actionable feedback!
O'Neill Vintners & Distillers
Guided Implementation
10/10
$13,700
55
City of Atlanta / Atlanta Information Management (AIM)
Guided Implementation
9/10
N/A
5
Best part - I could easily understand Mike's explanations. There were no negatives.
Champaign Residential Services Inc
Guided Implementation
10/10
$1,370
1
City of Steamboat Springs
Guided Implementation
10/10
$2,603
20
Jon was an excellent SME. We had to move quite slowly due to a plethora of other commitments. He adjusted his schedule to accommodate us. There ... Read More
City of Walla Walla
Guided Implementation
10/10
$2,740
2
Very insightful discussion with Michel, with action items/direction for next steps to help guide the process.
Legal Services Corporation
Guided Implementation
10/10
$13,700
20
It was so helpful to talk to Petar on a regular basis about our security policies. He provided realtime advice/best practices on each security poli... Read More
Psac
Workshop
10/10
$37,500
50
The best part was the knowledge and guidance of Horia to go over all the policies so quickly and with great feedback and input to guide us. Horia w... Read More
Champaign Residential Services Inc
Guided Implementation
10/10
$13,700
10
Having an outside perspective to help us review each policy has been invaluable. Sometimes, we have blinders on when it comes to our own environmen... Read More
NIPPON GASES EURO-HOLDING, SLU
Workshop
9/10
$36,999
32
Trillium Mutual Insurance Company
Guided Implementation
10/10
$3,000
20
Excellent resource, both knowledgeable and experienced. Recognized our concerns, encouraged us in our progress and showed us other tools which coul... Read More
Caribbean Public Health Agency
Guided Implementation
10/10
$12,999
20
College Medical Center Long Beach
Guided Implementation
10/10
$12,999
50
STERIS Corporation
Guided Implementation
10/10
$12,999
20
The best part was the mapping to the standards of the policy statements. It is something we are keeping as we transfer it to our standard format. ... Read More
Nieuport Aviation
Guided Implementation
10/10
$6,000
10
Eastern Lancaster County School District
Guided Implementation
8/10
$10,399
50
Lake County, FL
Workshop
10/10
N/A
10
Having time to focus on our security policies and to have input from an expert was extremely valuable. We were able to get through several policy d... Read More
Svante
Guided Implementation
8/10
N/A
N/A
The instructor helped me guide which direction and order I should tackle this issue. I'm hoping to continue conversation regarding general security... Read More
United Way Suncoast
Guided Implementation
10/10
N/A
23
Best part of the experience was working with the analyst as he understood what we were looking for as an organization. Worst part was working on th... Read More
Legal Practitioners Fidelity Fund
Guided Implementation
9/10
$2,298
5
State Universities Retirement System Of Illinois
Workshop
10/10
$116K
10
Cameron and Danny were great and highly knowledgeable and did not stop at only policy reviews but helped assess current NIST compliance as part of ... Read More
Caribbean Public Health Agency
Guided Implementation
10/10
$2,599
2
Very knowledgeable Very accommodation
Burke and Herbert Bank and Trust Company
Guided Implementation
10/10
$37,799
20
Factors Group of Companies
Guided Implementation
10/10
$20,500
5
Kern County Information Technology Services
Guided Implementation
9/10
$2,742
5
The interactions with the experts.
Camosun College
Guided Implementation
9/10
$10,000
20
The part was seeing how all the security policies work together, how simple they are yet effective. The downside is that when I took our work to se... Read More
City of Alexandria, VA
Guided Implementation
9/10
$84,499
18
The best part was talking to an experienced consultant about the pain points that were having throughout the process. The worst part was trying to... Read More
Inter Continental Real Estate and Development Corporation
Guided Implementation
10/10
$2,599
5
It helps to have someone give guidance on what policies should look like and what not to put in them.
City Of Chesapeake
Guided Implementation
9/10
N/A
N/A
The consultant was very knowledgeable and professional.
Cross Insurance
Guided Implementation
8/10
N/A
2
The best part was discussion around ideas of building engagement between the business and security posture as well as participation from staff. ... Read More
Workshop: Develop and Deploy Security Policies
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Module 1: Define the Security Policy Program
The Purpose
- Define the security policy development program.
- Formalize a governing security policy lifecycle.
Key Benefits Achieved
- Understanding the current state of policies within your organization.
- Prioritizing list of security policies for your organization.
- Being able to defend policies written based on business requirements and overarching security needs.
- Leveraging an executive champion to help policy adoption across the organization.
- Formalizing the roles, responsibilities, and overall mission of the program.
Activities
Outputs
Understand the current state of security policies.
Align your security policies to the Info-Tech framework for compliance.
Understand the relationship between policies and other documents.
Prioritize the development of security policies.
Discuss strategies to leverage stakeholder support.
Plan to communicate with all stakeholders.
Develop the security policy lifecycle.
- Prioritized list of required security policies
- Security policy charter
Module 2: Develop the Security Policy Suite
The Purpose
- Develop a comprehensive suite of security policies that are relevant to the needs of the organization.
Key Benefits Achieved
- Time, effort, and money saved by developing formally documented security policies with input from Info-Tech’s subject-matter experts.
Activities
Outputs
Discuss organizational risks and drivers that must be addressed by policies.
Develop and customize security policies.
- Security policies (approx. 9)
Module 3: Develop the security policy suite (continued)
The Purpose
- Develop a comprehensive suite of security policies that are relevant to the needs of the organization.
Key Benefits Achieved
- Time, effort, and money saved by developing formally documented security policies with input from Info-Tech’s subject-matter experts.
Activities
Outputs
Discuss organizational risks and drivers that must be addressed by policies (continued).
Develop and customize security policies (continued).
Discuss a plan to submit policies for approval.
- Security policies (approx. 9)
Module 4: Implement Security Policy Program
The Purpose
- Ensure policies and requirements are communicated with end users, along with steps to comply with the new security policies.
- Improve compliance and accountability with security policies.
- Plan for regular review and maintenance of the security policy program.
Key Benefits Achieved
- Streamlined communication of the policies to users.
- Improved end user compliance with policy guidelines and be better prepared for audits.
- Incorporate security policies into daily schedule, eliminating disturbances to productivity and efficiency.
Activities
Outputs
Discuss organizational risks and drivers that must be addressed by policies (continued).
Develop and customize security policies (continued).
Discuss a plan to submit policies for approval.
- Policy communication plan.
- Security awareness and training program development tool.
- Security policy assessment tool.