<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy writing in Member Support</title>
    <link>https://community.isc2.org/t5/Member-Support/Policy-writing/m-p/292#M29</link>
    <description>&lt;P&gt;Information Security Policies Made Easy By Charles Cresson Wood&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the foundation of an information security library&lt;/P&gt;</description>
    <pubDate>Sun, 08 Oct 2017 13:59:56 GMT</pubDate>
    <dc:creator>Kerry_Anderson</dc:creator>
    <dc:date>2017-10-08T13:59:56Z</dc:date>
    <item>
      <title>Policy writing</title>
      <link>https://community.isc2.org/t5/Member-Support/Policy-writing/m-p/247#M24</link>
      <description>What books or courses (online) would you recommend to learn how to write information security based policies and standards?</description>
      <pubDate>Mon, 09 Oct 2023 08:17:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Policy-writing/m-p/247#M24</guid>
      <dc:creator>Moe</dc:creator>
      <dc:date>2023-10-09T08:17:54Z</dc:date>
    </item>
    <item>
      <title>Re: Policy writing</title>
      <link>https://community.isc2.org/t5/Member-Support/Policy-writing/m-p/264#M26</link>
      <description>ISO/IEC27001/2</description>
      <pubDate>Sun, 08 Oct 2017 13:48:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Policy-writing/m-p/264#M26</guid>
      <dc:creator>FL140</dc:creator>
      <dc:date>2017-10-08T13:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: Policy writing</title>
      <link>https://community.isc2.org/t5/Member-Support/Policy-writing/m-p/292#M29</link>
      <description>&lt;P&gt;Information Security Policies Made Easy By Charles Cresson Wood&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the foundation of an information security library&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 13:59:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Policy-writing/m-p/292#M29</guid>
      <dc:creator>Kerry_Anderson</dc:creator>
      <dc:date>2017-10-08T13:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: Policy writing</title>
      <link>https://community.isc2.org/t5/Member-Support/Policy-writing/m-p/359#M37</link>
      <description>&lt;P&gt;Information Security Policies and Procedures; a Practitioner's Reference by Thomas Peltier is a good one that I use.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 14:45:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Policy-writing/m-p/359#M37</guid>
      <dc:creator>Solinus</dc:creator>
      <dc:date>2017-10-08T14:45:20Z</dc:date>
    </item>
    <item>
      <title>Re: Policy writing</title>
      <link>https://community.isc2.org/t5/Member-Support/Policy-writing/m-p/2258#M225</link>
      <description>&lt;P&gt;Thomas R. Peltier: Information security Policies, Procedures and Standards. Guidelines for effecti Infosec Management.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Oct 2017 22:50:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Policy-writing/m-p/2258#M225</guid>
      <dc:creator>JLUGO</dc:creator>
      <dc:date>2017-10-29T22:50:25Z</dc:date>
    </item>
  </channel>
</rss>

