Information security policy
What is information security policy and what is its central role in a successful information security program?
What are two major types of security policy?
What is needed to implement effective policy?