Creation and implementation of IT security policies new applications such as cloud computing and the increasing use of smart phones for business purposes make IT security with new challenges. A set of rules to successfully ward off threats of IT and the introduction of IT security policies play a central role. For the creation and successful implementation of IT security policies, the intensive course “IT security policies” the organiser AG offers a practical guide Under the direction of Dr. Gerhard Klett, the participants will learn how they avert dangers for IT security specifically through staff training and access controls. How important facts, wallpapers and information on topics are discussed: – current threats the security goals – successful defence of attacks against the Security – IT security standards: IT-sec/common criteria, ISO 27001, COBiT, BSI basic protection management of IT security policy after the PDCA (plan-do-check-Act) model – choice of the appropriate structure and building an IT-security policy – latest additions for mobile and cloud computing – key performance indicators to verify the completeness and effectiveness based on a practical checklist, the participants will learn how they create their own comprehensive IT security policy and take into account important aspects of IT security. More information and registration see: its company description the organiser AG based in Kreuzlingen, Switzerland is a Europe-wide Active, independent operator of high quality conferences, symposia and seminars. Experts from research, science, practice and policy present regularly pragmatic approaches and pioneering trends. Company contact: Organiser AG Stephan Mayer Hauptstrasse 54 8280 Kreuzlingen Tel: 0041 71 677 8703 E-Mail: web:.