How to Write Information Security Policy

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 พ.ค. 2023
  • In this video, I will walk you through the process of writing an information security policy from scratch. This policy will outline the security measures that your company will take to protect your data from unauthorized access. I will explain the different parts of this policy and objectives of the policy, the structure of the policy, and the components of the policy. By the end of this video, you'll be able to write a comprehensive information security policy from scratch, and protect your data accordingly. I will also provide some tips on how to develop a draft security policy.
    GRC Part 1
    • GRC Practical Approach...
    GRC Part 2
    • GRC Practical Approach...
    GRC Part 3
    • "Unlock the Secret to ...
    How to make career progression post #isc2 and #isaca
    • How to Make a Career P...
    How to make career in GRC
    • Learn How to Make an A...
    How to Build PIMS
    • How to Implement Priva...
    How to Implement 27001 in an organization
    • Implementing ISO 27001...
    How to conduct PIA
    • How to Conduct Privacy...
    How to Make an career in GRC
    • Learn How to Make an A...
    Telegram Group
    t.me/Prabhstudy
    Start your career in cybersecurity with free resources
    Cybersecurity Career: How to Make a Career in Cybersecurity 2022 lnkd.in/gCGBnRM7
    Pentesting Career
    lnkd.in/gQYenKYd
    GRC Interview Questions
    • GRC
    Pentesting Interview Questions
    • Pentesting
    Network Security Interview
    • Network Security
    Telegram Group Link
    t.me/Prabhstudy
    Cybersecurity Guide
    • Cybersecurity Guide
    SOC Interview Questions
    • SOC Analyst Introducti...
    Follow me on Instagram
    prabhnair?...
    #infosecpolicy #policy #grc

ความคิดเห็น • 26

  • @kwabenabaah8268
    @kwabenabaah8268 ปีที่แล้ว +1

    It’s always a joy to watch your video, clear and practical articulation of concepts. Keep it up and thanks

  • @sj6957
    @sj6957 ปีที่แล้ว

    Yes sir, you are guiding us like our big brother.

  • @madhavanmenon3389
    @madhavanmenon3389 ปีที่แล้ว

    Thank you Prabh for this insightful tutorial. You have explained each term in very simple language.

  • @iamrebeccai
    @iamrebeccai 9 หลายเดือนก่อน

    Thank you so much for this video Prabh

  • @muhammadsameer2335
    @muhammadsameer2335 ปีที่แล้ว

    Appreciate your effort for IT sec community

  • @amarmore4403
    @amarmore4403 ปีที่แล้ว

    Thanks Sir for this video. It is helping me to upgrade my skills in Infosec career. Stay blessed 😊

  • @anandsinghdhouni
    @anandsinghdhouni ปีที่แล้ว

    Thanks for sharing sir...

  • @niteshtomer898
    @niteshtomer898 ปีที่แล้ว

    Thank you prabh🙏

  • @mizan427
    @mizan427 ปีที่แล้ว

    Hats off to you sir

  • @abrahr2420
    @abrahr2420 ปีที่แล้ว

    Thank you Prahb!! 🙏

  • @adnanalmalki
    @adnanalmalki ปีที่แล้ว

    Great 👍 ❤ ur so professional

  • @iammikeade8257
    @iammikeade8257 ปีที่แล้ว

    Thank you Prabh

  • @singhshaminder
    @singhshaminder 4 หลายเดือนก่อน

    Hi Prabh, thankyou for the session, would be great if u could continue with the series of CIFS heads and subheads. Thank you.

  • @aibanes1
    @aibanes1 10 หลายเดือนก่อน

    Great content Prabh, is there any training or material that you can suggest specific to policies, std, etc creation and administration?

  • @HarleenKaur-cg7of
    @HarleenKaur-cg7of ปีที่แล้ว

    Hello Prabh, thanks for making these videos which helps us to build our understanding. Can you also add how to perform IT Audit in your this series or make another series for Audit ( ITAC/ITGC/ BP) and explain it. Thanks.

  • @robinsondurai
    @robinsondurai ปีที่แล้ว

    Thank h prabh

  • @raphaelschaller4981
    @raphaelschaller4981 24 วันที่ผ่านมา

    Thanks for the details and information. Is there an article or paper containing the contents of this video so I can cite statements in a scientific paper?

  • @codewiththarindu
    @codewiththarindu 10 หลายเดือนก่อน

    thank you, sir

  • @akashdeepbhardwaj1482
    @akashdeepbhardwaj1482 ปีที่แล้ว

    Thanks sir

  • @germainkone9029
    @germainkone9029 ปีที่แล้ว

    Hello Prabh! Thank for your hard work. What is the difference between Information security and IT security. People use both interchangeably . can you please clarify this for us please. Thanks

  • @maheshsharma1091
    @maheshsharma1091 ปีที่แล้ว

    Hello Prabh, thanks for your very informative videos. I have a query about the topic of security architect training. Please make a video on it, how can I take the complete training of it.

  • @dishapanjwani9367
    @dishapanjwani9367 10 หลายเดือนก่อน

    can you please share example policy document.
    And what are compulsory documents to have.
    We create document only for clause 4-10 or also for the controls?

  • @sachin-tr4nc
    @sachin-tr4nc ปีที่แล้ว

    Hi prab sir, I have request for u, so please look into for your upcoming students in cyber security domain
    1)- Make a Mock Interview on Cyber security Analyst as u have done for SOC Analyst in your youtube channel
    2)-Make a Interview questions on Cyber Security Analyst with Real Time Scenarios based Q&A
    Thanks in Advance & Have a great year ahead 🙂 .

  • @irshadrafiq
    @irshadrafiq 8 หลายเดือนก่อน

    Hi Mr. Prabh, thanks for useful information
    Any video on Saudi regulatory authority "NCA & SAMA" to map with NIST, ISO or other regulatory authorities
    Please make a detailed video for learning and job finding with that specific area. thanks

  • @x_man007
    @x_man007 ปีที่แล้ว

    how to write an audit report
    next video please 🙏

  • @himanshuparihare9900
    @himanshuparihare9900 ปีที่แล้ว

    Sir i need your help please reply