Information security policies and end-user awareness training

Email Alerts

Register now to receive SearchSecurity.in-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • information security management system (ISMS)

    An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data. 

  • vulnerability and patch management

    Vulnerability management is a pro-active approach to managing network security. 

  • CERT-In (the Indian Computer Emergency Response Team)

    CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization. The purpose of CERT-In is to respond to computer security incidents, report on vulnerabilities and promote effective IT ... 

  • Information Technology Amendment Act 2008 (IT Act 2008)

    The Information Technology Amendment Act, 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act (ITA-2000). The IT Amendment Act was passed by the Indian Parliament in October 2008 and came into force a year later. 

About Information security policies and end-user awareness training

Get information security policy and end-user security training resources here. Learn how to draft an information security policy. Fine tune your information security policy and conduct security policy reviews. Conduct end-user security awareness training sessions. Effectively enforce security policies.