Does your Change Management Process Need a Conversion?
We are seeing findings related to change management cropping up in several audit reports this year. Appropriately scoping change management can be...
3 min read
Chris Bedel : Apr 19, 2019
Most organizations answer that question with: “examiners haven’t had any issues with them, they’re just fine.” In some cases, that may be true, but examiners have finite resources and have to pick their battles, so don’t let that be your only indicator.
Your main priority should be the create policies that are understandable, clear on expectations, easy to reference so you can find what you’re looking for, and they should be written in a way that they can grow and evolve with your organization. If you’re just writing them with the sole purpose of satisfying examiners, you’re probably missing the mark in some way.
Your policies drive your information security program, getting them right is not a luxury, it is a necessity.
Over the past few months, we’ve found ourselves in several policy re-write projects and from those, I’ve made some observations on why it’s time for financial institutions (FI) to refresh their policies and how to go about it if they choose to take it on themselves.
This leads to confusion and makes policies difficult to use.
Policies need to be a high-level direction for the program; when they contain “procedural” wording they can become lengthy and require frequent updates as the environment changes.
Either way, this is the biggest issue of the 3.
If you’re thinking that it may be time to sit down and revisit your policies, we have a few recommendations that can help:
As painful as this process may seem, it’s worth the investment. Refreshing and reorganizing your information security policies will pay dividends in the long run on improved and efficient management as well as less time spent debating redundancies, deciphering conflicting information, and having to make frequent updates.
If you don’t know where to begin, we can help get you started on the right foot by performing a Policy Gap Analysis for you. This will help you know where your current policies stand and where you need to go with them.
For more information email us at support@bedelsecurity.com and write “More info on PGA” in the subject line.
How to Create a Data Classification Policy
https://www.bedelsecurity.com/blog/how-to-create-a-data-classification-policy
Is it Time to Rethink Your Email Policy?
https://www.bedelsecurity.com/blog/time-rethink-email-policy
Free Resource: Remote Access Risk Assessment
https://www.bedelsecurity.com/lp-remoteriskassessment
Implement Practical Policies and Processes to Improve Your Cybersecurity
https://www.bedelsecurity.com/blog/implement-practical-processes-policies-improve-security
We are seeing findings related to change management cropping up in several audit reports this year. Appropriately scoping change management can be...