Webinar Recording:
Webinar: Simple, Comprehensive Cybersecurity Policy Management – The WISP Solution
Date: Wednesday, March 1, 2023
Time: 11 a.m. – 12 noon Central Standard Time
Cost: Free
Host: LRS Education Services
Presenter: Troy Stoneking, Certified NIST Cybersecurity Framework Professional Trainer
Webinar Overview:
You have a gaping hole in your cybersecurity! You can have all the technical controls in the world, but if you’re missing this one SIMPLE tool, you’ll always be highly vulnerable. Introducing the Written Information Security Program or WISP. Cybersecurity is more than just firewalls and anti-malware solutions. The core of any effective cybersecurity program is documentation to manage it. In this webinar we will give you a very simple, highly organized method for discovering what cybersecurity policies should be in your cybersecurity program, and how to access all those cybersecurity policies from one place. In additional you will quickly see where you are missing critical policies. The WISP is your single solution to cybersecurity policy utopia!
Target Audience:
This webinar is designed for individuals who want to move from a disorganized ad-hoc cybersecurity policy set to one that comprehensively aligns with the NIST Cybersecurity Framework. If you are directly involved in the planning, design, creation, implementation, and/or improvement of a cybersecurity program that will follow the principles of the NIST Cybersecurity Framework (NCSF), then this webinar is for you! This includes cybersecurity leaders such as CIOs, CISOs, IT directors, and IT managers as well as cybersecurity and IT staff.
Attendees will learn how to:
|
Attendees will receive free:
|
1. Determine what policies should be in their cybersecurity program. |
A 1-hour training session on what a WISP is, the value of it, and how to create your own. |
2. Organize their policies based on the NIST Cybersecurity Framework. |
A fully editable digital copy of a WISP template so you can walk away with the ability to immediately begin creating your own WISP. |
3. Find gaps in their cybersecurity policies. |
|
4. Create a single, simple document that gives access to all cybersecurity policies. |
|
Presenter Biography:
Troy Stoneking is a Certified NIST Cybersecurity Framework Professional Trainer and Cybersecurity Assessor. He is also a Microsoft Certified Trainer and holds multiple Microsoft and CompTIA certifications. Stoneking conducts NIST Cybersecurity assessments and regularly updates NIST Cybersecurity Framework courses from LRS taught to students from private companies around the world, the United States military, and federal and state agencies. He joined LRS Education Services in 2007 and has worked in information technology and cybersecurity for more than 25 years.