Building and Implementing a Successful Information Security Policy

The purpose of this paper is to outline the strategies and managing processes behind implementing a successful Security Policy. Additionally, I will give recommendations for the creation of a Security Awareness Program, where the main objective will be to provide staff members with a better, if not much improved understanding of the issues stated in a security policy. We will also be focusing on significantly reducing the integration period of the security policy, by way of proper explanation of all of the items pointed out in a formal security policy document.

This paper is by no means intended to be a complete reference on the process of building a security policy or the development of a security awareness course. Instead, it was created with the idea of providing the reader with a reliable source of advice, various recommendations and useful tips gathered from my personal experiences while building and developing security policies, as well as conducting security awareness courses. This document will also provide you with a sample security newsletter, best practises concerning various information security threats, as well as discuss in detail some of the most common security problems which companies are facing every day (concentrating specifically on security problems endangering somehow the continuity and the proper functionality of the institution).

Click here to download (PDF)

This document is provided “AS IS,” with no express or implied warranties. Use the information in this document at your own risk.

This PDF document may be re-distributed without prior permission from us, provided the PDF and it’s copyright notice are not changed in any way. Therefore feel free to email this document, print it to share with colleagues or post it to your website. must be clearly acknowledged as the owners of the document and a link provided to should you post this document to your website. Those that have done so are invited to email us at [email protected] so that we may consider including a reciprocal link to your site within our own links section.

Leave a Comment

Your email address will not be published.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top