Crafting Robust Security Policies and Procedures with Layer 8 CISO