Writing an effective IT Security Policy

About This Course

IT Security Policy PlanningThis course provides IT managers and administrators with the core skills they need to produce an effective IT Security policy document.

The course is designed in a workshop format, in order to provide an open forum environment for senior management to understand the issues relating to the production of an IT Security Policy Framework, and work together to ensure all relevant areas are covered by the documentation.

With the introduction of international standards such as ISO 27001 many organizations large and small, require a formalized IT security policy framework and the associated IT Security Policy documentation.

However, the production of such documentation is a complex process and has implications for every part of your business.

The policy documentation should delegate areas of responsibility, as well as explicitly define the overall security criteria and strategy for your organization.

It must also cover complex technical areas such as remote access policies and business continuity and disaster recovery.

Who Should Attend

Relevant board members, Senior management, IT Managers and systems administrators.


One day onsite.

The course covers:

  • The importance of management cooperation and buy-in
  • Risk analysis
  • IT Security Policy structural overview
  • Defining the organizational specific areas to be covered by the security policy
  • Security through knowledge
  • Defining and delegating responsibility
  • The KISS Principle
  • Putting it all together
  • Policy maintenance

Active learning

Production of a Remote Access Security Policy Document
Presentation to the Senior Management

Request Information

Course Title
Breakfast Briefings Training Courses Outsourcing Consultancy About Us

IT Security for Small Business Owners
Data Protection Act For Small Business
IT Security Awareness for Directors & Managers
Data Protection Act For Directors & IT Managers
IT Security Awareness for Non Technical Staff
The Data Protection Act and EU GDPR
Developing a Comprehensive Security Policy for IT Managers
Disaster Recovery & Business Continuity Planning for IT Managers
HNWI & VIP Clients
Secure Email & Cloud
Secure Remote Access
IT Security
Disaster Recovery & Business Continuity
Secure Remote Access
About Us
Contact Us
Copyright © 2016 Esix Ltd. All rights reserved