{"115551":{"#nid":"115551","#data":{"type":"event","title":"Creating an Information Security Policy","body":[{"value":"\u003Cp\u003EInformation Security Policy is the fundamental and essential component of sound information security practice, and yet 60% of companies either have no policies or have policies that are out of date. Well formulated policy provides key high level descriptions of goals and expectations that are the basis for developing enterprise security procedures, mechanisms, controls, guidelines and standards needed for a comprehensive and effective information security program. This course provides the foundation skills for building an effective information security policy. \n\u003C\/p\u003E\n\u003Cp\u003EAbout The Course\n\u003C\/p\u003E\n\u003Cp\u003EThis course will provide skills in how to determine policy needs and in developing, evaluating, and monitoring information security policies. \n\u003C\/p\u003E\n\u003Cp\u003EWho Should Attend\n\u003C\/p\u003E\n\u003Cp\u003EManagers, system and network engineers and administrators and consultants who are involved with the creation, review and maintenance of information security policies and procedures. \n\u003C\/p\u003E\n\u003Cp\u003EPrerequisites\n\u003C\/p\u003E\n\u003Cp\u003EBefore beginning this course, you should understand and be conversant in the basic concepts of business information systems and information security. \n\u003C\/p\u003E\n\u003Cp\u003ECourse Objectives\n\u003C\/p\u003E\n\u003Cp\u003EInformation security policy issues, considerations, and recommended practices are addressed at increasing layers of complexity, beginning with the importance of corporate policies and who is responsible for them, followed by the life cycle for developing policies, types ands components of policies and policy maintenance issues including compliance and enforcement. At the successful completion of the course, you will be able to: \n\u003C\/p\u003E\n\u003Cp\u003E- Understand information security policy concepts\u003Cbr \/\u003E\n- Develop information security policy\u003Cbr \/\u003E\n- Utilize policy standards\u003Cbr \/\u003E\n- Maintain and review information security policies\u003Cbr \/\u003E\n- Plan for training and support \n\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"This course will provide skills in how to determine policy needs and in developing, evaluating, and monitoring information security policies.","format":"limited_html"}],"field_summary_sentence":[{"value":"Creating an Information Security Policy"}],"uid":"27272","created_gmt":"2006-07-05 00:00:00","changed_gmt":"2016-10-08 01:48:47","author":"Eric Huffman","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2006-11-14T07:30:00-05:00","event_time_end":"2006-11-15T15:30:00-05:00","event_time_end_last":"2006-11-15T15:30:00-05:00","gmt_time_start":"2006-11-14 12:30:00","gmt_time_end":"2006-11-15 20:30:00","gmt_time_end_last":"2006-11-15 20:30:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"related_links":[{"url":"http:\/\/www.pe.gatech.edu\/conted\/servlet\/edu.gatech.conted.course.ViewCourseDetails?COURSE_ID=225","title":"Register today for this course"}],"groups":[{"id":"1258","name":"Professional Education"}],"categories":[],"keywords":[{"id":"6679","name":"creating web pages"},{"id":"6678","name":"html"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"10377","name":"Career\/Professional development"}],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cstrong\u003EAngela Ayers\u003C\/strong\u003E\u003Cbr \/\u003EDistance Learning and Professional Education\u003Cbr \/\u003E\u003Ca href=\u0022http:\/\/www.gatech.edu\/contact\/index.html?id=0\u0022\u003EContact Angela Ayers\u003C\/a\u003E\u003Cbr \/\u003E\u003Cstrong\u003E404-385-3525\u003C\/strong\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}