This paper highlights the critical role of security governance. It answers key questions about governing IT Security in your enterprise. Very Good Read! |
This presentation discusses a framework for information security and business alignment - the extent to which the ISEC function is integrated into the rest of the business organization |
This paper proposes a preliminary framework for information security governance that builds on the lessons of Federal Information Security Management Act (FISMA) and ISO 17799. |
This guide explains the basics of information technology governance and how to implement it successfully. What is IT Governance? What is IT Governance Lifecycle? What is the IT Governance Process? How do you enable change management for IT Governanc... |
This presentation discusses information security and compliance risk management - what is it? why do it? - and introduces a framework to implement it in the healthcare industry. |
Arguing that in some organization boundaries between IT Governance, Accounting, BPM and Security Administration are blurring, the author highlights key mega trends driving this convergence and discusses some points to consider when making the move yo... |
This presentation makes the connection between corporate governance, information technology IT governance, information security governance, and risk management. |
This report presents a comprehensive examination of the affect of IT Governance on the adoption of technology innovation in the enterprise. What is the impact of IT Governance on innovation? What kind of governance models are the best for technology ... |
This document provides an in-depth introduction to information technology governance (IT Governance), and connects it to corporate governance on the one hand, and IT Risk Management on the other. (75 Pages) |
This document provides guidance on assessing security controls in information systems and organizations. Security controls assessment is the primary mechanism to verify that information systems and organizations are meeting their stated security goa... |
This paper presents a process-oriented approach to manage organizational change needed to improve information security compliance. The approach uses Business Aligned Information Security anagement (BAISeM) and principles that have been derived from... |
This presentation provides information security governance guidance for information security managers. |
This guide provides step by step guidance on planning for, and implementing a comprehensive information technology Governance Plan (IT Governance Plan) for the enterprise. The salient feature of this guidance is the focus on integrating key IT proces... |
This presentation introduces information technology governance and information security governance and key concepts related to them - what is IT governance? what is IT security governance? what is the IT security Governance framework? what are some l... |
This presentation presents a strategic view to IT Governance (information technology governance). There are many good definitions, and discussions on IT Governance but this one focuses on the context, and outcomes related to the topic. CIOs will lear... |
This presentation provides an in-depth introduction to information technology governance. What is IT Governance? Why is IT Governance important? What are some common IT Governance definitions? How to implement IT Governance? How to audit IT Governanc... |
This presentation provides an in depth discussion on creating an IT Governance capability in the enterprise with a focus on security, and risk management. It also provides guidance on the role of leadership in implementing an effective IT Governance ... |
This simple template provides step by step guidance to create a governance plan. CIOs can adapt it to create an IT Governance plan for their organization. |
An overview of information technology security - define information security, detail functional areas, discuss security standards and regulations, describe testing techniques for IT security audits, and information security organization maturity leve... |
This document provides guidance on applying the IT Security Assessment Framework - establishes five levels of standardized security status and criteria - by identifying 17 control areas, such as those pertaining to identification and authentication ... |
This quick introduction to information security governance also covers tips on implementing it successfully. |
This presentation provides a definition for information security governance and how to implement it in your organization. |
This paper provides an overview of information security governance for the board of directors so "the board can provide a level of needed oversight to this vital business function that is adequate and necessary, and in doing so, exercise its essenti... |
This presentation discusses the business need for information security governance. |