Policies

Show left menu  
Hide left menu  

The process of documenting the policies and procedures which underpin IT security in the organisation will help information security stakeholders to think through the work streams which need to be completed and the resources, skills and training needed to complete them. For example, a Forensic Readiness Plan will help an organisation understand exactly what they need to do in the event of a compromise – who to contact, who will be responsible for collecting, collating and documenting evidence; and which evidence sources (log data for example), covering which time periods, should be available to assist in an investigation.

Context specialists will work with client to make sure they create the best policy to suit the needs of the organisation.

Back to Top