SOUTHFIELD – Running an information security organization is often very reactive. As you fight your way through the jungle of chaos, you realize that you need rules, regulations and controls to build a fortress to shelter your valuable against risks and threats. But how do you get and keep everything under control? With your information security policy documents, of course. Creating usable policy documents is very tricky if you don’t know where to start or how to make them meaningful and enforceable. In the Nov. 17 session,
Date: November 17 Time: 6 to 8 PM Location: Register to receive the meeting invite.
|