User Tools

Site Tools


policies_and_controls

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
policies_and_controls [2017/10/22 22:04]
108.67.6.4 created
policies_and_controls [2019/12/02 16:56] (current)
admin
Line 3: Line 3:
 [[https://​www.peerlyst.com/​posts/​why-and-how-to-write-cyber-security-procedures-and-policies-magda-chelly-ph-d| how to write cyber security procedures and policies]] [[https://​www.peerlyst.com/​posts/​why-and-how-to-write-cyber-security-procedures-and-policies-magda-chelly-ph-d| how to write cyber security procedures and policies]]
  
 +[[https://​www.peerlyst.com/​posts/​iso-27001-2013-free-toolkit-with-policies-examples-magda-chelly-ph-d|Policies Examples]]
 +
 +[[https://​lnkd.in/​e8UEKdY|13 Fantastic Resources for Writing an Information Security Policy]]
 +
 +[[https://​www.peerlyst.com/​posts/​iso-27001-2013-free-toolkit-with-policies-examples-magda-chelly-ph-d|ISO 27001:2013 - FREE TOOLKIT WITH POLICIES EXAMPLES]]
policies_and_controls.1508724275.txt.gz ยท Last modified: 2017/10/22 22:04 by 108.67.6.4