The Information Security Training Strategy was developed by the Company as a tool to prepare for and implement the internal security training and awareness program.
Business success depends on employees being able to make sense of information and turn it into appropriate decisions and preserve it. This requires an effective communication process within the organization.
Our main objective is to draw attention of Company’s employees on the importance of information security policies and procedures and to ease understanding of the concept and meaning of keeping information safe and secure.
CONTENT
1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. THE PLAN (WHAT, WHO, WHEN AND HOW)
3.1 TRAINING
3.2 AWARENESS
4. RESOURCES
5. EXCEPTIONS
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION
Pages: 8
The Managing IS Risks in IT Services Provided by Third Parties Standard requires the use of risk management techniques to stipulate controls necessary for the management of the relationship with IT third parties and those controls required in formal agreements with the IT third parties.
The objective of the Business Continuity Management Policy is to establish the framework for the proper business continuity management of the Company.
The purpose of this procedure is to formalize an Internal Investigation process by the Security Department and to guarantee the quality of the services provided by Security Department and the professionalism of the Company’s investigators. Also, provide Company's investigators with a common repository in terms of language, rules of conduct and methods to guarantee that the investigations are carried out with professionalism, in a standardized approach
Review Information Security Training Strategy.
You must be logged in to post a review.