Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & Training

Information security: Developing practical policies and procedures

By Michael J. Del Giudice, David R. McKnight
Security compliance
July 28, 2021

Cybersecurity is one of the leading concerns among today’s executives and risk management professionals. Yet despite its importance, organizations still lack pragmatic cybersecurity policies and procedures. Even in companies with relatively sophisticated information security functions, written policies and procedures often are designed primarily for compliance purposes instead of functioning as practical, useful tools that can help proactively manage risk.

To be effective, cybersecurity policies and procedures must do more than merely help an organization achieve check-the-box compliance with regulatory requirements or security frameworks. Rather, policies and procedures should be a critical component of the overall information risk management effort, helping the organization to define standards and expectations, set direction, and proactively manage and mitigate cybersecurity risk.

Going beyond compliance

The rapid onset of the digital age generated major structural changes in the ways that many business processes are implemented and managed. Ideally, information security policies and procedures would help risk management teams address these fundamental changes by defining standards and providing direction on key risk management initiatives.

Unfortunately, the complexity of the regulatory environment often leads companies to focus first on achieving compliance instead of creating functional standards that can support critical cybersecurity programs. The situation is further complicated by difficulty in finding, recruiting, and retaining personnel, which often is exacerbated by an overall lack of resources that would enable companies to focus on a comprehensive policy and procedure initiative. Fast-changing technology, an array of disconnected legacy systems, and an evolving threat landscape add to the challenge.

As a result, many information security policies and procedures soon become “shelf ware” that might be adequate for compliance purposes but are of little use when threats emerge or issues arise – as they inevitably will. In such cases, organizations find themselves on the defensive, reacting to security events in real time rather than proactively managing and mitigating risk. In order to break this pattern and develop and implement pragmatic and effective policies and procedures, senior management must recognize the problem and set organizational expectations for risk management.

Developing a practical approach

Cybersecurity policies and procedures do not need to be prescriptive or excessively granular. However, they should be inherently practical by defining critical risk management program components and providing guidance to employees on their roles and expectations.

The first step in developing practical information policies and procedures is to define the specific goals of the effort. The senior risk management team must clearly spell out objectives so that the specific programs the team ultimately designs will identify, monitor, and address the most significant risks to the organization.

In many instances, this process involves a formal risk assessment, particularly in publicly traded companies or highly regulated industries such as healthcare or financial services. Other organizations with less stringent outside oversight might be able to use a less rigid or highly structured process, but in every type of organization, the development of cybersecurity policies and procedures should be a risk-based effort. Such an approach is necessary to identify both the threats to which an organization is particularly vulnerable and the areas of risk that have the potential greatest impact on the organization’s ability to pursue its strategic objectives.

With the goals defined, the next step is to inventory any existing policies and procedures that already are in place. Ideally, the development team could either apply or adapt some existing elements and use these as a starting point.

Often, however, the management team recognizes that the existing policies and procedures were assembled on an ad hoc basis, drawing on disparate sources that are inconsistent or incongruent. Many of the existing elements might not be relevant or applicable to current circumstances. In short, the team should not be afraid of starting over if necessary.

However, starting over does not mean working from a completely blank page. An important early decision is the choice of an appropriate policies and procedures template, which can provide a solid starting point. Organizations such as the SANS Institute have devoted significant resources to gathering the current best thinking among information security professionals without promoting specific vendors or products.

Bear in mind, though, that such templates require customization. Teams should avoid the temptation to just fill in the blanks and adopt a template verbatim. The right template can provide a useful framework and checklist of critical elements – but the elements themselves should reflect the organization’s specific requirements.

In addition to looking to a template for guidance, the risk management team should look for opportunities to collaborate with peers or partners in other organizations for further insights. It is also important to take a similarly collaborative approach in coordinating with other business units within the organization. Such units often can offer significant functional expertise to help enhance cybersecurity risk management.

For example, in a banking or other financial services business, the financial crime and fraud units will have valuable insights that can help with specific information technology risk initiatives. In public sector organizations, public safety personnel have extensive experience with crisis management. Such hands-on expertise is invaluable in formulating response plans for cybersecurity breaches.

Involving other departments in the development of policies and procedures can also help secure buy-in from stakeholders and ultimately facilitate compliance. As noted earlier, the policies and procedures should not be specifically prescriptive, but they should include clear end-user guidelines and well-defined expectations for employees regarding the handling of sensitive of information, password policies, acceptable use of personal devices, and similar issues. Input from those with day-to-day engagement can make it easier to develop guidelines that are both effective and realistic.

Other critical elements to incorporate include comprehensive incident response procedures, detailed third-party risk management policies, and clearly defined patch management policies and procedures. These components become even greater in importance as more and more information technology is outsourced to the cloud and other third-party providers.

Putting policies and procedures into practice

Even the most carefully developed policies and procedures will be of little value beyond compliance if they are not actively communicated throughout the organization and applied consistently. In addition to launching an initial deployment with visible support from the executive level, the risk management team should make sure that cybersecurity policies and procedures are communicated throughout the organization regularly and that operational personnel are aware of their specific roles and responsibilities. In most organizations, this communication can be accomplished through a combination of scheduled annual training and periodic refreshers that address targeted components.

Finally, it is important for all concerned to recognize that effective policies and procedures must incorporate a continuous improvement element. Instead of being a one-time effort to create a “set-and-forget” document, the development process must be ongoing and include regularly scheduled updates. Maintenance and adherence components should be incorporated from the outset and updated in every subsequent iteration of the program.

At a minimum, a comprehensive review of the policies and procedures should take place annually. Information security capabilities and technology are continually maturing, and the threat landscape is constantly evolving. Even more important, an organization’s risk appetite – as well as its long-term goals and strategies – will evolve as leadership adapts to changing conditions and opportunities.

Timely review is essential to reevaluate how well the policies and procedures address the current environment. In addition, regular and consistent testing is necessary to help verify the continued effectiveness of incident response program elements. All response components should be tested at least annually, using either tabletop testing or other recognized techniques.

Embracing opportunity

The events of 2020 and 2021 have demonstrated how quickly and significantly risks can change – and how important it is to continually review and update policies and procedures to accommodate unforeseen events. The most effective risk management teams will use this process to do more than merely maintain compliance with regulatory requirements. Rather, they will engage the opportunity to define, develop, and implement practical programs for actively managing IT risks.

KEYWORDS: compliance tools cyber security cybersecurity preparedness security compliance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael J. Del Giudice, CISSP, CRISC is a Principal at Crowe. You can contact him at +1 630 575 4359 or mike.delgiudice@crowe.com.

David R. McKnight, CISSP is a Principal at Crowe. You can contact him at +1 630 575 4399 or dave.mcknight@crowe.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • healthcare 3 responsive default

    Five Steps to Developing a Healthcare Information Technology Security Plan

    See More
  • Limiting Access Is the First Step to Securing Networks, cyber security news, NIST Cybersecurity Framework, access management

    Data protection report finds decline in information security training and policies may negatively impact US businesses

    See More
  • Woman in tech office

    Breaking down DE&I barriers: Practical tips for security leaders

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • November 17, 2025

    SECURITY 500 Conference

    This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!