Developing and Implementing Information Security Procedures and Policies

Information systems security policies primarily address threats. In the absence of threats, policies would be unnecessary. Unfortunately, threats do exist and information systems security policies are necessary to provide a framework for selecting and implementing countermeasures against them.

An enforceable written policy helps ensure that everyone within the organization coherently behaves in an acceptable manner with respect to information security. A well-designed information security policy defines the objectives of the information system of an organization and outlines a strategy to achieve the objectives. Policies, standards, guidelines, and training materials that are obsolete and not enforced are particularly dangerous to an organization, organizations should regularly review, test, and discard un-enforced and otherwise obsolete rules, controls, and procedures to avoid a false sense of security.

There is a fine line between a secure information environment and an environment that is so restrictive it interferes with the daily activities if the network users. This discussion will cover the components of a secure environment, the impact of security on network usability and implementing policies that provide a balance between the protection of assets and the network user.

Featured Speaker(s)

Cheryl Lyn Granto - Cheryl has been in the IT Network and IT Network Security fields since 1982. After she graduated from the University of Florida she accepted a position with the University’s campus computing organization and then later moved on to manage the Campus network UFNet. She left Florida to accept a position in Atlanta as the Director of Security for Mindpsring/EarthLink and then moved to a tier one ISP, NetRail, Inc. Cheryl is now the supervisor of the IT Security group for Broward County Government. Cheryl’s areas of specialization are in the implementation of sound security solutions in a diverse IT environment and management of IT personnel.

Rebecca Ann Schmaus �" Becky has worked in the IT Industry since 1970. She is a graduate of Texas A&M University, and obtained her MCSE certification in 1997. Becky worked for the Eastman Kodak Corporation for 18 years implementing and maintaining networks for numerous business clients. In 1998, she joined The North Broward Preparatory Schools as the Director of Technology Services. She designed the schools’ network and is responsible for network operation, planning and network security, as well as budgeting, staffing and managing both IT and Training personnel. Becky’s areas of specialization include network design, project management and staff management. In her current position, Becky has a unique perspective on security threats; most are internal and known but she can't fire them for any havoc they may wreak.

Schedule of Events

Registration and networking reception begin at 6pm, the presentations will begin promptly at 7:00pm until 8:00pm.