Skip to main content

On-demand webinar coming soon...

Blog

6 questions, 2 InfoSec directors: Your policy management answers

Whether you view policies as a necessary evil or the bedrock of your InfoSec program, you’ll appreciate the perspectives from two practitioners.

Jason Koestenblatt
Team Lead, Content Marketing
September 21, 2022

Blue and violet gradient background

Everything starts with policies. They formalize your risk & control environment and help drive action and accountability. Successful IT and security teams establish buy-in for policies and collaborate effectively with the business to enforce and manage compliance against them. 

In a recent OneTrust-hosted webinar, Kevin Liu, Director of Information Security at OneTrust, and Jeremy Hendrix, Director of Information Security at Arcadia, spoke to common pitfalls of policy management for InfoSec teams and walked the audience through a series of practical steps and checkpoints that helped make their teams successful. 

Additionally, Kevin and Jeremy answered follow-up questions around how they’d approach real-word scenarios around policy attestations, who should own policies, how to measure success, and more. The following is a transcription of that conversation. Liu will be noted as KL in the text, and Hendrix as JH. 

 

Achieving compliance & building relationships with the business

Question: 

As we introduce new policies or standards, the business argues we don’t “do that,” so it can’t be in the policy, and we will fail our audits, despite a strong need to move the business to adopt the change. What is the best way to address this argument?

Answer:

JH: It might help to take a step back for a moment and align on ‘why are we doing this’? The core purpose of being compliant with a policy is to manage risk across the organization. We don’t want to play ‘gotcha’ or go around slapping hands. The goal is to partner with business stakeholders to help them bake new obligations into their processes before we dictate that certain actions may be taken before we implement a control or put a new standard into place. It’s important that they know what’s coming and that we help them get there. 

KL: Engage with stakeholders early and often. The result of not taking this approach will result in findings and issues, which is painful for everybody. Become that trusted advisor. Help them understand that you are not trying to restrict them from doing business, but helping ensure that they do so in a secure manner. If they need time to implement a new process or solution to be compliant, perhaps you think about risk acceptance in the interim.  

Question:

Should you have aspirational policies? How do you balance the need for policies that can reasonably be met by the organization, while being able to show the bar for internal compliance has not been set too low? 

Answer:

JH:  If we’re creating aspirational policies, we’re shooting ourselves in the foot on achieving compliance, and creating extra work around an exception or issues management process. I have been in a situation where we were pressured by a regulator to include something in a policy that we were not compliant with at that point in time, so we time bound it. We put them in the policy, but included verbiage along the lines of “these shall be implemented within 12 months of X.”

KL: I completely agree. We should do everything we can to avoid issues, and that starts with ensuring that the statements and requirements within policies & standards are things we can achieve. If you’re aspiring to achieve something, document that outside of your policy as future goals or objectives you want to accomplish. Then work with stakeholders to establish when you can comply with these goals and objectives, and re-evaluate your policies based on your ability to comply by the effective date. This will put you in the best position to comply with these aspirational goals and future audits.

 

Policy attestation

Question: 

Is there an acceptable level of compliance for policy attestation? For example, if 96-98% of staff have acknowledged the policy, and you’re endlessly chasing the last 2%?

Answer: 

JH: The only acceptable level is 100%, and we do end up spending a lot of time chasing that last two (percent). That 100% doesn’t happen right away. We usually give 30 days and then maybe there’s a training program involved. It’s not very onerous, but it is something folks need to do. It is a thorn in our side when we have to chase these people down. But now we have these automated systems where we can deploy these nuisance emails. When you’re past due you’ll begin getting emails every day, sometimes twice a day until it’s complete. 

KL: Security is too important to apply an 80/20 rule. We strive for 100% acknowledgement. We accomplish this by implementing it during week one of onboarding. New employees, including contractors, must complete the security requirements in that first week, or access will be revoked. During the annual refresher course, it is a bit more challenging. We end up chasing a little bit more for that one, but we do have processes in place to make sure the refresher courses are completed in a timely manner. 

Question: 

My company runs into an issue where we want to make sure policies are known/understood but attestations for all policies is unrealistic. Which policies should have attestations?

Answer: 

KL: You have to understand which policies are enterprise-level and which are not. If my InfoSec is enterprise-wide, everybody must attest to it and its supporting documents. For policies that are not enterprise-wide, it’s helpful to understand people’s roles and responsibilities to provide you with a better path of which policy should be attested to by which individuals. For example, I don’t have access to make changes to our production environment or pull code sets from our code repository, so it doesn’t make sense for me to attest to our SDLC (software development life cycle) and change management policy.

JH: We attest for all our policies, but if you consider the integrated nature of policies, standards, and procedures — we really only have a few policies. Risk management, InfoSec, SDLC policies. We have a lot of standards that fall under those, however. By attesting to that InfoSec policy, they’re also attesting to those standards. So we make sure to include links to relevant standards within policies and verbiage that “by attesting to the policy, you are also attesting to the standards within.” 

 

Policy metrics

Question: 

Beyond reported incidents, what other metrics are useful in monitoring a policy program? I tend to see qualitative measures (feedback) but am interested in quantitative measures. 

Answer:

KL: Metrics are important to me because they tell me what am I doing well, where I need to redeploy resources, etc. Some of my favorite metrics are from phishing campaigns, everyone does a phishing campaign, right? You send a phishing email, and the metric is how many people report it. Let’s say 80% of employees report it. Does that tell me everything I need to know about how successful the campaign was? What about the exposure time? If you send out a phishing email but the first report comes in 24 hours later, have you trained your employees to recognize a phishing email? Exposure time from when the phishing email was sent to the first report of the email is the more important metric in my opinion, because with a lower exposure time, you can delete the email from everyone’s inbox, and lower the risk of someone clicking on the phishing email which may escalate to an incident.

JH: I agree that metrics are important. Policies are a bridge from strategy to action. To have an effective strategy, you need to have an effective way to measure the action. Some of the indicators of policy effectiveness are: control effectiveness; number of issues or violations related to the policy; number of exceptions requested; and number of risks accepted against the policy.

 

Policy ownership

Question:

Is it ok to have policies that are co-owned? For example, existing information security policy is currently owned by IT while we stand up governance. Governance has an interest in security and data classification. So, who should own it? 

Answer:

KL: It really depends on how your organization is set up. Is there conflict of interest? If IT is owning a policy that they also must comply with, I’d question if there is any risk with that kind of ownership. Should it be separated where you have a dedicated team that’s reviewing or updating it? If you’re too small of a shop, you have to make sure it’s right-sized so you’re not creating too much of a resource constraint. You’ll need to establish roles and responsibilities on who’s updating or authoring the policy. Have a review & approval process established with potential conflicts of interest in mind. 

JH: I don’t think there’s any specific guidance that says you can’t, but I think best practice would be to have a singular owner. If we need to, bring IT folks in as collaborators, and if there’s a need to expand out, then you can involve committees. That way you can get more ownership across the organization.

The path to creating an effective policy management process is not a smooth or straight one. However, it can be paved by teamwork that includes clear ownership and stakeholder buy-in. To find out more about the process and building blocks needed to succeed, watch the webinar here. 

To learn more about OneTrust GRC & Security Assurance and request a demo, click here.


You may also like

Webinar

Technology Risk & Compliance

Compliance Automation product showcase

Join our live demonstration and see how Compliance Automaiton can help boost compliance efficiency with automated workflows, shared evidence, and 40+ frameworks.

December 19, 2024

Learn more

Webinar

Technology Risk & Compliance

The PDPL in Saudi Arabia is now in effect: is your business ready?

Join our Saudi Arabia PDPL webinar for an overview on the data protection law, its requirements, and how to prepare for full enforcement.

December 12, 2024

Learn more

Webinar

Technology Risk & Compliance

Elevating client compliance with OneTrust Automation: Key strategies for partners

Discover how to use OneTrust Compliance Automation to establish client baselines, improve efficiency, and drive scalability. Learn key strategies to enhance your compliance impact.

December 11, 2024

Learn more

Webinar

Technology Risk & Compliance

Understanding the NIS 2 Directive: Compliance insights and best practices

This DataGuidance webinar explores the latest and expected developments in the implementation of the NIS 2 Directive, focusing on practical compliance strategies to ensure your organization is prepared.

December 04, 2024

Learn more

Webinar

Technology Risk & Compliance

Tech risk and compliance masterclass: An evidence-based approach to building by-design risk and compliance practices

Discover strategies to embed compliance and risk management into business processes with minimal disruption, using technology-driven solutions for efficiency, scalability, and improvement.

November 06, 2024

Learn more

Webinar

Technology Risk & Compliance

Building a strong security posture: Managing compliance, risk, and business engagement in a dynamic landscape

Join our webinar to learn how to optimize security posture, streamline compliance, and leverage automation to manage IT risk in today's complex digital landscape. Register now!

October 29, 2024

Learn more

Webinar

Privacy Automation

Build resiliency and operationalize compliance with OneTrust: Fall product release recap, 2024

Join our upcoming product release webinar to explore how these new capabilities can help your organization navigate complex frameworks, streamline third-party management, and accelerate AI and data innovation.

October 22, 2024

Learn more

Webinar

Technology Risk & Compliance

Tech risk & compliance masterclass: The anatomy of a framework

Master the fundamentals of constructing robust compliance frameworks that can seamlessly integrate with organizational operations while aligning with regulatory and strategic mandates to deliver measurable insights on your progress and gaps.

August 14, 2024

Learn more

Webinar

Technology Risk & Compliance

Tech risk and compliance masterclass

Unlock tech risk management & compliance excellence. Master risk management, build robust frameworks, and foster cross-functional collaboration for long-term resilience.

August 07, 2024

Learn more

Webinar

Technology Risk & Compliance

Introducing OneTrust Compliance Automation

Join us as we explore OneTrust Compliance Automation, a holistic and fully integrated solution that streamlines and optimizes workflows, compliance, and attestation.

July 25, 2024

Learn more

Webinar

Data Discovery & Classification

Catch it live: See the all-new features in OneTrust's Spring Release and Post-TrustWeek recap

Join us as Ryan Karlin, Senior Director of Product Marketing highlights important updates from TrustWeek including an inside look into OneTrust's new platform features that make it easier for customers to activate data responsibly, surface and mitigate risk, and navigate the complex regulatory environment.

June 06, 2024

Learn more

Report

AI Governance

GRC strategies for effective AI Governance: OCEG research report

Download the full OCEG research report for a snapshot of what organizations are doing to govern their AI efforts, assess and manage risks, and ensure compliance with external and internal requirements.

May 22, 2024

Learn more

Infographic

Third-Party Risk

Streamline compliance with the Digital Operational Resilience Act (DORA)

Download our infographic to learn about the new DORA regulation, who needs to comply, and how OneTrust can help streamline the process.

April 29, 2024

Learn more

Webinar

Ethics Program Management

EthicsConnect: Risk - It’s not just for breakfast anymore

Join us for a deep dive into embedding privacy by design into the fabric of your business to promote the responsible use of data.

April 25, 2024

Learn more

Infographic

Technology Risk & Compliance

Rethinking risk assessments: Bridging the gap between best practices and action

Download our infographic to learn the main challenges faced during risk assessments, proven frameworks for assessing risks, and how to translate guidance into action.

March 07, 2024

Learn more

Webinar

Technology Risk & Compliance

PCI DSS Compliance: How to scope and streamline monitoring with Certification Automation

Join our PCI DSS webinar where we discuss how Certification Automation can help free up valuable InfoSec resources, streamline audits, and stay continuously compliant.

March 05, 2024

Learn more

eBook

Ethics Program Management

Business messaging apps: A guide to corporate compliance

How can your business use third-party messaging apps while staying compliant? Dive into key usage considerations based on the DOJ’s 2023 guidance.

February 13, 2024

Learn more

Webinar

Technology Risk & Compliance

5 automation trends to modernize InfoSec compliance

Join our webinar for insights on transforming InfoSec program management. Navigate the complexities of modern security with a flexible, scalable, and cost-effective approach.

February 07, 2024

Learn more

Infographic

Third-Party Risk

4 top-of-mind challenges for CISOs

What key challenges do CISOs face going into the new year? Download this infographic to hear what experts from industries across the board have to say.

January 30, 2024

Learn more

eBook

Technology Risk & Compliance

NIST CSF 2.0: Changes, impacts and opportunities for your Infosec program

Get your free guide to the NIST Cybersecurity Framework 2.0 and learn how its proposed changes will impact your InfoSec programs.

December 18, 2023

Learn more

Resource Kit

Technology Risk & Compliance

NIST CSF essentials: Empowering cybersecurity excellence

Download our NIST CSF Essentials resource kit and master cybersecurity compliance with expert insights, strategies, and real-world case studies.

December 15, 2023

Learn more

Webinar

Technology Risk & Compliance

Demonstrating GDPR compliance with Europrivacy criteria: The European Data Protection Seal

Join our webinar to learn more about the European Data Protection Seal and to find out what the key advantages of getting certified.

November 30, 2023

Learn more

Checklist

Technology Risk & Compliance

SOC 2 checklist: 8 steps to achieve compliance

This SOC 2 checklist provides clear action steps that enable you to mature your security program and fast-track your way to compliance.

November 28, 2023

Learn more

Data Sheet

Technology Risk & Compliance

Integrations to automate your framework compliance: ISO 27001, SOC 2, and NIST CSF

Explore how OneTrust integrations can help you automate compliance with today’s most popular InfoSec frameworks.

November 28, 2023

Learn more

Webinar

Ethics Program Management

Ethics Exchange: Risk assessments

Join our risk assessments experts as we discuss best practices, program templates, and how provide an assessment that provides the best value for your organization.

October 25, 2023

Learn more

Infographic

Technology Risk & Compliance

Understanding Europe's Top InfoSec and Cybersec Frameworks

Learn the ins and outs of Europe’s top InfoSec and cybersec frameworks, including ISO 27001, UK Cyber Essentials, the NIS2 Directive, DORA, and more.

October 05, 2023

Learn more

Infographic

Technology Risk & Compliance

5 key areas for improved automation in InfoSec compliance

Streamline and scale your organization’s InfoSec compliance program by focusing on these five key areas of automation.

October 02, 2023

Learn more

eBook

Technology Risk & Compliance

Prioritizing the right InfoSec frameworks for your organization

In this free eBook, we explore the basics of three top InfoSec frameworks and how to decide which is the best fit for your organization.

September 27, 2023

Learn more

Webinar

Third-Party Risk

Live Demo EMEA: How OneTrust can help advance your third-party risk management program

Join us for a live demo of OneTrust's third-party risk management solution and see how it can help automate and streamline your TPRM program.

September 19, 2023

Learn more

eBook

Privacy Management

Responsible data use: Navigating privacy in the information lifecycle eBook

Download this eBook and get the insights you need to safeguard customer privacy and ensure responsible data use in the information lifecycle.

August 22, 2023

Learn more

Webinar

Technology Risk & Compliance

How to successfully implement ISO 27001 to demonstrate security and assurance across any jurisdiction

Join our live webinar and hear from security professionals on how to get ISO 27001 certified, streamline audit preparation, and demonstrate security assurance across any regulatory jurisdiction.

June 28, 2023

Learn more

eBook

Third-Party Risk

InfoSec's guide to third-party risk management: Key considerations and best practices

Download our eBook to learn practical advice on how to approach third-party risk management like an InfoSec expert.

June 05, 2023

Learn more

Webinar

GRC & Security Assurance

Combating InfoSec compliance fatigue: Insights for navigating growingly complex requirements

In this webinar, you will hear first-hand from information security experts experts what are the key pain-points and their strategies to be audit ready. 

February 27, 2023

Learn more

Webinar

Technology Risk & Compliance

Introducing OneTrust Certification Automation: Build, scale, and automate your InfoSec compliance program webinar

In this webinar, learn how to right-size your compliance scope for different frameworks across various business dimensions and enable an agile audit process.

February 15, 2023

Learn more

Webinar

GRC & Security Assurance

Introducing OneTrust Certification Automation: Reinforce privacy accountability with automated InfoSec compliance

Learn how to enable an agile audit process by breaking down complex InfoSec requirements into actionable tasks to help automate your compliance program.

February 10, 2023

Learn more

eBook

Technology Risk & Compliance

The future of information security

Learn how to respond to the security landscape and build a proactive InfoSec program to help your customers and business.

October 10, 2022

Learn more

eBook

Technology Risk & Compliance

The art of the enterprise IT risk assessment

Ensure your enterprise IT risk assessment is a success with a top-down approach that gets executive buy-in from the start

September 16, 2022

Learn more

eBook

Technology Risk & Compliance

The enterprise DevSecOps playbook

As a unified business function, DevSecOps combines rapid software development with top-notch security at scale.

September 02, 2022

Learn more

Webinar

GRC & Security Assurance

How to reinforce your InfoSec risk program in a “Not If, But When” incident environment webinar

Learn how scaling your approach to managing IT assets & risk assessments can deliver a complete picture to better measure and inform program investments.

August 16, 2022

Learn more

Webinar

GRC & Security Assurance

5 critical mistakes to avoid when answering security questionnaires

Avoid these 5 critical mistakes when answering security questionnaires and streamline responses with this webinar.

March 01, 2022

Learn more

Webinar

GRC & Security Assurance

How successful security teams manage risk to build Trust and drive Growth

Watch this webinar to learn what makes a successful risk management program and how effective security teams build trust.

January 12, 2022

Learn more

Webinar

Privacy Management

Build an incident management playbook

Prepare for privacy and security incidents by building an incident management playbook.

August 27, 2021

Learn more

Fundamental to Comprehensive: Where Does Your Compliance Program Stand? Infographic | Resources | OneTrust

Learn more