[ WebToolTip.com ] Corporate Security Policies by Infosec
File List
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/04 - Ethics, business, security, and policies.mp4 59.5 MB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/04 - Cybersecurity frameworks.mp4 54.3 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/09 - Reading, writing, technical writing, and editing.mp4 54.2 MB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/03 - Introduction to law and regulation.mp4 50.9 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/10 - Tracking changes within documents and version control.mp4 50.7 MB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/07 - When and how to seek legal review.mp4 41.9 MB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/05 - Cybersecurity laws and regulations, part 1.mp4 40.9 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/02 - Project management basics.mp4 39.5 MB
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/02 - The business mission is always first.mp4 37.8 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/03 - Overview of all steps and phases.mp4 36.7 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/08 - Resolving differences of opinion.mp4 36.2 MB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/06 - Tools to assist with creating and managing policies.mp4 36.2 MB
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/06 - Synchronizing business needs and priorities.mp4 33.3 MB
- ~Get Your Files Here !/05 - 4. Planning the Security Document Project/04 - Where are we now, and where do we want to go.mp4 33.0 MB
- ~Get Your Files Here !/05 - 4. Planning the Security Document Project/03 - Planning, scoping, and selling (evangelizing) the project.mp4 32.4 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/04 - Review your project's scope and avoid scope creep.mp4 32.4 MB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/02 - Government regulatory guidance.mp4 32.3 MB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/09 - Effective governance documents look like this.mp4 32.3 MB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/08 - Building internal rules conceptually.mp4 31.8 MB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/06 - Cybersecurity laws and regulations, part 2.mp4 31.5 MB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/10 - The people who write, read, and approve security policies.mp4 30.7 MB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/01 - Introduction to corporate security policies.mp4 29.7 MB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/05 - Rethinking the rules pyramid as a platform.mp4 28.1 MB
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/03 - Knowing your organization's mission, business, and culture.mp4 27.8 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/12 - Gaining approval and finalizing the documents.mp4 27.5 MB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/04 - Introducing laws as external rules to inform policies.mp4 27.2 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/07 - People skills for managing and communicating in your project.mp4 27.2 MB
- ~Get Your Files Here !/05 - 4. Planning the Security Document Project/01 - Introduction to planning the policy project.mp4 26.0 MB
- ~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/03 - When to start a new document project.mp4 25.0 MB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/02 - What are security policies, and why do we need them.mp4 25.0 MB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/03 - Rules introduced Let’s talk about what they are in general.mp4 24.9 MB
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/07 - Summary.mp4 24.8 MB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/02 - Legal implications of policies and procedures.mp4 24.2 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/13 - Publication, training, and implementing phases.mp4 24.1 MB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/04 - Internal rules Organization policies, procedures, and more.mp4 22.8 MB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/03 - Finding good sample infosec policies from the internet.mp4 22.1 MB
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/01 - Introduction to business needs for policies.mp4 21.5 MB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/08 - Summary.mp4 21.5 MB
- ~Get Your Files Here !/05 - 4. Planning the Security Document Project/02 - Planning for when you don't have time to plan.mp4 21.2 MB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/07 - Planning policies and internal rules conceptually.mp4 20.2 MB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/07 - Summary.mp4 19.9 MB
- ~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/02 - Document usage and the maintenance phase.mp4 19.6 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/01 - Overview of project management and execution.mp4 19.6 MB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/01 - Introduction to external laws and rules.mp4 19.5 MB
- ~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/01 - Post-project.mp4 19.3 MB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/06 - Three platforms plus a fourth to build your policies.mp4 18.9 MB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/05 - Books, articles, and other resources.mp4 17.3 MB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/01 - External guidance to assist with security policies overview.mp4 16.8 MB
- ~Get Your Files Here !/05 - 4. Planning the Security Document Project/05 - Who should be on your team, and who else should be involved.mp4 15.4 MB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/11 - Policy knowledge and skills introduced.mp4 13.7 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/05 - Starting the project Project kickoff.mp4 13.1 MB
- ~Get Your Files Here !/05 - 4. Planning the Security Document Project/06 - Summary.mp4 12.4 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/11 - Security and technical decisions.mp4 12.1 MB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/12 - Summary.mp4 12.1 MB
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/05 - Good internal rules help the business achieve its mission.mp4 11.9 MB
- ~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/04 - Summary.mp4 8.7 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/06 - Review relevant existing internal rules.mp4 8.1 MB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/14 - Summary.mp4 5.9 MB
- ~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 1 Handout Policies.pdf 3.9 MB
- ~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 5 Knowledge Check.pdf 199.4 KB
- ~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 3 Knowledge Check.pdf 186.3 KB
- ~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 4 Knowledge Check.pdf 170.3 KB
- ~Get Your Files Here !/Ex_Files_Corporate_Security_Policies/Exercise Files/Course 2 Knowledge Check.pdf 166.4 KB
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/04 - Ethics, business, security, and policies.srt 40.4 KB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/03 - Introduction to law and regulation.srt 40.3 KB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/04 - Cybersecurity frameworks.srt 38.7 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/09 - Reading, writing, technical writing, and editing.srt 38.2 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/10 - Tracking changes within documents and version control.srt 35.2 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/02 - Project management basics.srt 33.1 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/03 - Overview of all steps and phases.srt 32.5 KB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/05 - Cybersecurity laws and regulations, part 1.srt 32.3 KB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/07 - When and how to seek legal review.srt 30.6 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/08 - Resolving differences of opinion.srt 29.5 KB
- ~Get Your Files Here !/05 - 4. Planning the Security Document Project/03 - Planning, scoping, and selling (evangelizing) the project.srt 28.9 KB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/06 - Tools to assist with creating and managing policies.srt 28.4 KB
- ~Get Your Files Here !/05 - 4. Planning the Security Document Project/04 - Where are we now, and where do we want to go.srt 27.9 KB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/10 - The people who write, read, and approve security policies.srt 27.8 KB
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/02 - The business mission is always first.srt 27.4 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/04 - Review your project's scope and avoid scope creep.srt 26.9 KB
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/06 - Synchronizing business needs and priorities.srt 25.8 KB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/09 - Effective governance documents look like this.srt 25.3 KB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/08 - Building internal rules conceptually.srt 24.1 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/07 - People skills for managing and communicating in your project.srt 24.0 KB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/02 - Government regulatory guidance.srt 22.9 KB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/06 - Cybersecurity laws and regulations, part 2.srt 22.6 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/12 - Gaining approval and finalizing the documents.srt 22.5 KB
- ~Get Your Files Here !/05 - 4. Planning the Security Document Project/01 - Introduction to planning the policy project.srt 22.1 KB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/05 - Rethinking the rules pyramid as a platform.srt 21.6 KB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/02 - What are security policies, and why do we need them.srt 21.5 KB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/03 - Rules introduced Let’s talk about what they are in general.srt 21.0 KB
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/03 - Knowing your organization's mission, business, and culture.srt 20.9 KB
- ~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/03 - When to start a new document project.srt 20.7 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/13 - Publication, training, and implementing phases.srt 20.4 KB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/04 - Introducing laws as external rules to inform policies.srt 18.9 KB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/04 - Internal rules Organization policies, procedures, and more.srt 18.1 KB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/01 - Introduction to corporate security policies.srt 18.0 KB
- ~Get Your Files Here !/05 - 4. Planning the Security Document Project/02 - Planning for when you don't have time to plan.srt 17.4 KB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/03 - Finding good sample infosec policies from the internet.srt 17.3 KB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/02 - Legal implications of policies and procedures.srt 17.0 KB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/07 - Planning policies and internal rules conceptually.srt 16.1 KB
- ~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/02 - Document usage and the maintenance phase.srt 15.8 KB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/06 - Three platforms plus a fourth to build your policies.srt 15.3 KB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/01 - External guidance to assist with security policies overview.srt 14.5 KB
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/01 - Introduction to business needs for policies.srt 13.6 KB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/05 - Books, articles, and other resources.srt 13.5 KB
- ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/07 - Summary.srt 13.1 KB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/01 - Introduction to external laws and rules.srt 12.5 KB
- ~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/01 - Post-project.srt 12.5 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/01 - Overview of project management and execution.srt 12.5 KB
- ~Get Your Files Here !/05 - 4. Planning the Security Document Project/05 - Who should be on your team, and who else should be involved.srt 12.5 KB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/11 - Policy knowledge and skills introduced.srt 11.9 KB
- ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/08 - Summary.srt 11.6 KB
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/07 - Summary.srt 11.6 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/05 - Starting the project Project kickoff.srt 10.1 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/11 - Security and technical decisions.srt 9.6 KB
- ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/12 - Summary.srt 9.5 KB
- ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/05 - Good internal rules help the business achieve its mission.srt 9.0 KB
- ~Get Your Files Here !/05 - 4. Planning the Security Document Project/06 - Summary.srt 6.9 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/06 - Review relevant existing internal rules.srt 6.9 KB
- ~Get Your Files Here !/07 - 6. Using and Maintaining Your New Policies/04 - Summary.srt 6.4 KB
- ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/14 - Summary.srt 3.9 KB
- Get Bonus Downloads Here.url 180 bytes
- ~Get Your Files Here !/Bonus Resources.txt 70 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.