This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of HiScout GmbH
Forums it-sa Expo Knowledge Forum F

Policies - The power to control and monitor an ISMS

How policies not only give you control, but also significantly increase the efficiency and security of your IT infrastructure

calendar_today Wed, 23.10.2024, 14:00 - 14:15

event_available On site

place Forum, Booth 9-443

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Legislation, standards, regulations Governance, Riskmanagement and Compliance

Key Facts

  • Policies as a control instrument for IT security
  • Clear assignment of responsibilities through workflows
  • Analyses of the implementation status

Organizer

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

In an increasingly digital world, information security management systems (ISMS) are essential to ensure the integrity and security of sensitive data. But how do we ensure that these systems work efficiently and purposefully? The key is the correct use of policies. In this lecture, we will examine the central role of security policies within an ISMS and show how they can be used for control and monitoring.

From the definition of general security processes to the concrete implementation and back to a comprehensive overview - we go through the policy cycle and show how policies serve as a control tool for management. They are the basis for security requirements and enable effective self-assessment through GAP analyses. They also offer management-friendly evaluations of the implementation status, ensure a uniform approach, meet legal requirements and contribute to cost efficiency.

A particular focus is on the question of responsibility. How is it ensured that there are clear responsibilities from the guidelines to implementation on the asset? By individually defining responsibilities and supporting workflows, the assignment of those responsible can be made efficient and transparent. This approach is illustrated by practical examples and real-world experiences.

Let us show you how you can use policies to not only maintain control, but also to significantly increase the efficiency and security of your IT infrastructure. Experience how policies have the power to take your ISMS to the next level.
... read more

Downloads

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.