- Arrests made after international cyber-ring targets StubHub
- Dutch spy agencies can receive NSA data, court rules
- Apple tech note illuminates purported 'backdoor' services
- BlackBerry offers BES10 as a hosted service through partners
- File-encrypting Android ransomware 'Simplocker' targets English-speaking users
Information Security Policies, Standards and Procedure
As a result of the adjustments in the way business is conducted, ownership of information does not carry the same clear accountability it once did. Physical and behavioural boundaries used to exist around information management but these can be missing in the modern workplace. Clearly thought-out information security policies, standards and procedures addressing internationally supported standards, will go a long way to addressing the risk exposure these changes have created. In this third paper, “Policies, Standards and Procedures,” we discuss guidelines for effective information security management.
Please supply your email address to access the content.
- A new kind of solicitude: Co-creation with customers
- Australia's top digital marketers break away from the industry pack
- Carsales rolls out SAS's Intelligent Advertising technology
- Deloitte defines 5 attributes to cope with next wave of digital disruption
- CMOs and CIOs are getting along better, but increasingly frustrated with execution