security policy

  • Information security team reviewing governance pyramid

Three Elements that Complete the Governance Pyramid

2023-01-30T14:40:35-05:00

The governance pyramid is built bottom-up with policy, standards, process, procedures, and guidelines. To be effective, the structure needs to be organized, consistent, and aligned with to policy and business need.

Three Elements that Complete the Governance Pyramid2023-01-30T14:40:35-05:00
  • Photo of CISO discussing security as a process and reviewing information classification with team

What is SAAP? It is Security as a Process

2023-01-30T14:16:13-05:00

Security as a Process (SAAP) and the classification of information is fundamental to information security. This article, the second in a three-part series, looks at the "how" of information security and why it is so important.

What is SAAP? It is Security as a Process2023-01-30T14:16:13-05:00
  • Photo of CISO discussing security as a process and reviewing information classification with team

The Secrets Behind Information Security Organization

2023-01-30T14:39:33-05:00

Information security is a multifaceted field, covered with tempting baubles and sharp thorns. However, the unifying framework upon which the whole field is suspended is governance. This article, the first in a three-part series, looks at standards and policy—from why policies are needed and what needs to be done to support them.

The Secrets Behind Information Security Organization2023-01-30T14:39:33-05:00
Go to Top