SOUTHFIELD – Running an information security organization is often very reactive. As you fight your way through the jungle of chaos, you realize that you need rules, regulations and controls to build a fortress to shelter your valuable against risks and threats.

But how do you get and keep everything under control? With your information security policy documents, of course. Creating usable policy documents is very tricky if you don’t know where to start or how to make them meaningful and enforceable.

In the Nov. 17 session,

  • We will discuss the differences between a policy, standard, process and guidelines.
  • You will receive an overview of how to use the HITRUST CSF (Common Security Framework) to create Information Security policy documents.
  • We will view a sample of a policy and standard created from downloadable version of the
  • We will view a sample of a policy and standard created from downloadable version of the
  • Learn what to look for when you are creating your own policy documents using a framework.
Date: November 17  Time: 6 to 8 PM
Location: Register to receive the meeting invite.