Building an Information Security program in any organization is a daunting task, and in many cases has become a check in the box for maintaining compliance requirements.
That's not what an ISP is intended for and if implemented correctly and creates efficiencies, inoperability between business units, and a security-oriented organization.
We will kick things off by going over what an Information Security Program is supposed to be, the structure it takes in your organization, and how you can implement these best practices across your company's key operational procedures.