<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reading suggestions on governance and policy creation in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22244#M3</link>
    <description>&lt;P&gt;Thanks for the suggestion.&amp;nbsp; It was nicely reviewed at Amazon, so I ordered it.&lt;BR /&gt;&lt;BR /&gt;I'll also point out another suggestion seen elsewhere about the "&lt;A href="https://cybercanon.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;Cybersecurity Canon&lt;/A&gt;", which seems like an interesting list of titles.&lt;/P&gt;</description>
    <pubDate>Mon, 13 May 2019 18:31:59 GMT</pubDate>
    <dc:creator>ericgeater</dc:creator>
    <dc:date>2019-05-13T18:31:59Z</dc:date>
    <item>
      <title>Reading suggestions on governance and policy creation</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22239#M1</link>
      <description>&lt;P&gt;Greetings, everyone.&amp;nbsp; As a "novitiate" in cybersecurity (having only recently &lt;A href="https://webportal.isc2.org/custom/CertificationVerificationResults.aspx?FN=&amp;amp;LN=geater&amp;amp;CN=646513" target="_blank" rel="noopener"&gt;passed the CISSP exam&lt;/A&gt;), I am looking for some guidance on policy evolution.&amp;nbsp; My employer currently has policies, but they require some review.&amp;nbsp; As a "committee of one", I am looking to shore up my narrative before approaching the executives to propose a policy change.&lt;BR /&gt;&lt;BR /&gt;The SANS policy templates are fantastic for policy ideas, but they don't convey the executive&amp;nbsp;&lt;EM&gt;urgency&lt;/EM&gt; for creating&amp;nbsp;a policy with teeth.&amp;nbsp; So I'm looking for articles or books that will speak "executive" toward policy formation and GRC.&amp;nbsp; Are there any suggestions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;eg&lt;BR /&gt;&lt;BR /&gt;p.s. My employer is privately owned, and our initial compliance issues surround SLAs for select customers, but that's all.&amp;nbsp; There's nothing that requires SOX or GDPR, for example.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:12:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22239#M1</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2023-10-09T09:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: Reading suggestions on governance and policy creation</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22242#M2</link>
      <description>&lt;P&gt;I like "Information Security Policies, Procedures, and Standards: A Practitioner's Reference" by Douglas J. Landoll, 2016.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;He also has a great book on doing security risk assessments.&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 16:02:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22242#M2</guid>
      <dc:creator>emb021</dc:creator>
      <dc:date>2019-05-13T16:02:02Z</dc:date>
    </item>
    <item>
      <title>Re: Reading suggestions on governance and policy creation</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22244#M3</link>
      <description>&lt;P&gt;Thanks for the suggestion.&amp;nbsp; It was nicely reviewed at Amazon, so I ordered it.&lt;BR /&gt;&lt;BR /&gt;I'll also point out another suggestion seen elsewhere about the "&lt;A href="https://cybercanon.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;Cybersecurity Canon&lt;/A&gt;", which seems like an interesting list of titles.&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 18:31:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22244#M3</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2019-05-13T18:31:59Z</dc:date>
    </item>
    <item>
      <title>Re: Reading suggestions on governance and policy creation</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22249#M4</link>
      <description>&lt;P&gt;Here is a free resource from Peerlyst (BTW: they have many good references)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.peerlyst.com/posts/resource-free-comprehensive-information-security-policy-template-for-small-business-smb-sme-claus-cramon" target="_blank"&gt;https://www.peerlyst.com/posts/resource-free-comprehensive-information-security-policy-template-for-small-business-smb-sme-claus-cramon&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 22:37:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22249#M4</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2019-05-13T22:37:49Z</dc:date>
    </item>
    <item>
      <title>Re: Reading suggestions on governance and policy creation</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22257#M5</link>
      <description>&lt;P&gt;It generally works better from a buy in perspective to involve the stakeholders in policies in developing them rather than take a 'best' practice policy from a book or collection of policies.&amp;nbsp; Obviously it's right to be informed by good practice, but you'll need to work on making in appropriate for your organisation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd start by looking at the risks your organisation faces and the controls currently in place before introducing any additional controls.&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2019 09:24:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22257#M5</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2019-05-14T09:24:35Z</dc:date>
    </item>
    <item>
      <title>Re: Reading suggestions on governance and policy creation</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22264#M6</link>
      <description>&lt;P&gt;We'll definitely begin at the top and work our way down for sure.&amp;nbsp; Any reading material will help to inform decisions we make along the way.&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2019 12:39:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22264#M6</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2019-05-14T12:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: Reading suggestions on governance and policy creation</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22266#M7</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been teaching college senior and grad level I&amp;amp;T security policy courses, and have developed full I&amp;amp;T governance as well as ITSM courseworks, if you need a few pointers, you can pm me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2019 14:25:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22266#M7</guid>
      <dc:creator>Chuxing</dc:creator>
      <dc:date>2019-05-14T14:25:39Z</dc:date>
    </item>
    <item>
      <title>Re: Reading suggestions on governance and policy creation</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22275#M8</link>
      <description>&lt;P&gt;The biggest motivator for executives is for you to empress upon them risk. That risk can take the dimensions of being quantitative (numbers, the best option) or qualitative (for the more subjective determinations and what-if scenarios).What risk will most disrupt the bottom line? Is it business continuity? What are the policies you'll propose to prevent a disaster and what are the procedures to recover from it?&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2019 15:59:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22275#M8</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2019-05-14T15:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: Reading suggestions on governance and policy creation</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22407#M9</link>
      <description>&lt;P&gt;Thank you very much!&amp;nbsp; I hope to establish traction on this project very quickly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;eric&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/323397747"&gt;@Chuxing&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been teaching college senior and grad level I&amp;amp;T security policy courses, and have developed full I&amp;amp;T governance as well as ITSM courseworks, if you need a few pointers, you can pm me.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Fri, 17 May 2019 03:14:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22407#M9</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2019-05-17T03:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: Reading suggestions on governance and policy creation</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22516#M10</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Greetings, everyone.&amp;nbsp; As a "novitiate" in cybersecurity (having only recently &lt;A href="https://webportal.isc2.org/custom/CertificationVerificationResults.aspx?FN=&amp;amp;LN=geater&amp;amp;CN=646513" target="_blank" rel="noopener"&gt;passed the CISSP exam&lt;/A&gt;), I am looking for some guidance on policy evolution.&amp;nbsp; My employer currently has policies, but they require some review.&amp;nbsp; As a "committee of one", I am looking to shore up my narrative before approaching the executives to propose a policy change.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Eric,&lt;/P&gt;&lt;P&gt;Please allow me to toot my own horn, and suggest you watch my 25 minute presentation, &lt;A href="https://youtu.be/VhkH3BfWcd8" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Maybe It's the Boss's Fault, on YouTube&lt;/STRONG&gt;&lt;/A&gt;. My message is to be sure the security policies are in line with the way the workforce ACTUALLY works. Too many security polices are not realistic, and cannot be followed or enforced, because they interfere with the primary work, and make no sense to the employees. This is a direct result of letting security techies, alone, drive the policies. Password policies are only one example of the mess we have created.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd&amp;nbsp; be happy to have further direct discussion on this topic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2019 14:17:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22516#M10</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-05-20T14:17:55Z</dc:date>
    </item>
    <item>
      <title>Re: Reading suggestions on governance and policy creation</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22524#M11</link>
      <description>&lt;P&gt;A history of the Cybersecurity Framework that underpins governance can be found on the US Government's NIST site and NIST has great resources for small business as well.&amp;nbsp; Having served in cybersecurity in both industry and government (to include military service) for decades, I find NIST a good source of unbiased guidance that is not driven by trying to sell a product or consulting services.&amp;nbsp; Here is the link that explins how the cybersecurity framework evolved&amp;nbsp;&lt;A href="https://www.nist.gov/cyberframework/online-learning/history-and-creation-framework" target="_blank" rel="noopener"&gt;https://www.nist.gov/cyberframework/online-learning/history-and-creation-framework&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This link to the NIST Report for Cybersecurity Fundamentals for Small Business Owners, is a little gem that can really help with framing policy development for a small business, NIST has guides for several types of businesses.&amp;nbsp;&lt;A href="https://csrc.nist.gov/publications/detail/nistir/7621/rev-1/final" target="_blank" rel="noopener"&gt;https://csrc.nist.gov/publications/detail/nistir/7621/rev-1/final&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This link provides a&amp;nbsp;&lt;SPAN&gt;National Cybersecurity and Communications Integration Center’s (NCCIC)&amp;nbsp;&lt;/SPAN&gt;historical perspective going bak to 1963 and up to the present day:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.us-cert.gov/about-us" target="_blank" rel="noopener"&gt;https://www.us-cert.gov/about-us&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is a Washington Post Article that outlines the history of Internet Security going back to its inception and up to the present day:&amp;nbsp;&lt;A href="https://www.washingtonpost.com/graphics/national/security-of-the-internet/history/?noredirect=on" target="_blank" rel="noopener"&gt;https://www.washingtonpost.com/graphics/national/security-of-the-internet/history/?noredirect=on&lt;/A&gt;&amp;nbsp; there are even comments to his article that are relevant as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2019 16:03:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Reading-suggestions-on-governance-and-policy-creation/m-p/22524#M11</guid>
      <dc:creator>Frank_Mayer</dc:creator>
      <dc:date>2019-05-20T16:03:50Z</dc:date>
    </item>
  </channel>
</rss>

