Information Security Plans, Policies and Procedures Development

Policies and procedures reflect management guidance and direction in developing controls over information systems and related resources. Having good policies and procedures in place allow organizations to protect sensitive date and meet regulatory and compliance standards.

Policies are high level documents that establish rules and guide decision-making.  They represent the philosophy of an organization and the strategic thinking of senior management and business process owners.  Procedures are detailed documents that establish the process for how to carry out policy.

Wilson Consulting Group assists organizations in developing sound plans, policies and procedures to ensure proper control over information systems and related resources. The development and implementation of these plans, policies and procedures enable organizations to comply with applicable regulations and standards such as GLBA, HIPAA, NIST Series, PCI DSS, ISO 27001, and CobiT.

How Wilson Consulting Group will help you

WCG assists organizations to develop:

  • Business Continuity and Disaster Preparedness Plan
  • Gap Analysis
  • Business Impact Analysis
  • Risk Management Plan, Policies and Procedures
  • Incident Response Plan
  • Key Management Procedures
  • Information Security Policy
  • Access and Authentication Management
  • Acceptable Use
  • Backup and Restore
  • Business Continuity
  • Change Control
  • Configuration Management
  • Cryptographic Controls
  • Data Classification
  • Data Retention and Disposal
  • Incident Response
  • Mobile and Telecommuting
  • Malicious Software
  • Media Handling
  • Physical Security
  • Security Awareness and Training
  • System Logging and Monitoring
  • Vulnerability and Patch Management

IT Governance Services