NIST
Cybersecurity and Privacy Policies and Procedures Package
Need a new set of policies for your company? Or need to update an older set of policies? You have come to the right place!
Any good risk management program must be built upon a solid policy foundation. And those policies must be current with regulatory changes. These policies meet all regulatory requirements.
We have been building policies for 10 years and have exactly what you need.
Our newly updated policy package aligned with NIST includes the latest guidance for regulatory agencies.
List of included policies:
- 1.0- Data Security, Governance and Classification Policy and Procedures
- 1.1- Customer Data Protection Policy
- 2.0- Systems Operations and Availability Policy
- 3.0- Systems Capacity and Performance Policy
- 4.0- Systems and Network Hardening Policy and Procedures
- 4.1- Access Controls and Identity Management Policy and Procedures
- 4.2- Password Policy and Procedures
- 4.3- Encryption Policy
- 4.4- Patch Management Policy
- 4.4- Personnel Security Policy and Procedures
- 4.5- IT Infrastructure Risk Assessment Policy
- 4.6- Mobile Device and Telework Policy and Procedures
- 4.7- Systems and Network Monitoring Policy and Procedures
- 4.8- Wireless Network Policy and Procedures
- 4.9- Email Security Policy and Procedures
- 5.0- Personnel Security Policy and Procedures
- 5.1- Acceptable Use Policy
- 5.2 Security Awareness Training Policy
- 5.3- Cloud Computing Policy
- 6.0- Physical Security - Environmental Controls Policy and Procedures
- 7.0- Vendor Cyber Risk Management Policy
- 8.0- Incident Response Policy
- 9.0- IT Disaster Recovery and Business Continuity Policy
- 9.1- Data Backup Policy and Procedures
- 10.0- Records Retention Policy and Procedures
- 11.0- Operational Change Management Policy and Procedures
- 12.0- Systems & Application Development and Software QA Policy and Procedures
- 13.0- Artificial Intelligence Policy
- 14.0- Work-From-Anywhere Policy
All packages include:
- All required cybersecurity and privacy policies and procedures to meet your compliance requirements
- Specific compliance requirements related to policies and procedures
- Supplemental documents designed to support package deployment.
- Company name and logo customization
Supplemental documents include:
- 0.1- Message From CEO
- 0.2- How to Deploy These Policies
- 0.3- Helping Staff Comply With Cybersecurity
- 0.4- Pol and Proc Change Management SOP
- 0.5- Policy Scope-Responsible Parties Chart
NOTE: While these policies are the best available, they still require your team's attention. Your policy team must be prepared to:
- Read and understand the policies
- Decide which to keep and which to archive for now
- Edit them to fit your requirements
- Document management approval
- Train them to appropriate staff
- Enforce them
- Maintain/improve them
|
We are available to support you through any part of the above at any time via our current consulting support process.
Policy package price: $995.00
Please contact us to purchase or provide additional information:
Need some help? Ping me.
Ray Hutchins, Managing Partner
CyberCecurity
rh@cybercecurity.com
303-887-5864