Why Information Security Governance?


 This presentation discusses the business need for information security governance.

Why Information Security Governance? The following topics are discussed:
- What is information security governance?
- Why is information security governance important?
- What are the key business drivers for information security governance?
- An example of information security governance at work
- A discussion on COBIT in the context of information security governance
- What are the critical success factors to information security governance?
- What are some Key Performance Indicators (KPI) related to information security governance?

Download (please login and scroll down)

Download Document: Documents are in common file formats such as Microsoft Word (doc), Powerpoint (ppt), Excel (xls,csv,xlsx), and Adobe pdf.
Download


Related Categories




Related Topics



Related Articles


A Guide to IT Security Governance

This paper highlights the critical role of security governance. It answers key questions about governing IT Security in your enterprise. Very Good Read!

A Framework for Information Security and Business Alignment

This presentation discusses a framework for information security and business alignment - the extent to which the ISEC function is integrated into the rest of the business organization

A Framework for Information Security Governance

This paper proposes a preliminary framework for information security governance that builds on the lessons of Federal Information Security Management Act (FISMA) and ISO 17799.

Audit Like a Hacker

This presentation guides you through a security audit from a different perspective - that of a hacker who focuses on "value" among other things.

Case Study - Using IT Governance Controls for Security

This case study explores popular IT governance frameworks and their application for enterprise security and compliance. The presentation introduces, and compares three IT governance frameworks namely, ITIL, Cobit, and ISO 20000. Then, the presenter d...

e-Book - Integrating COBIT and Balanced Scorecard Framework

This paper proposes a framework that is based upon the integration of COBIT and the Balanced Scorecard frameworks. This new framework plugs key gaps in each framework, aligns business with IT, and improves audit capabilities. Excellent Read! (100 pa...

Identity Lifecycle Management

This presentation discusses the security challenges facing an enterprise, the cost of breaches, the need for and cost of compliance and then proposes using identity lifecycle management as a solution to address these challenges.

Information Security Governance

This presentation provides information security governance guidance for information security managers.

Information Security Governance Assessment Tool

 This paper presents an information security governance assessment tool based upon the information security governance (ISG) framework recommended by the Corporate Governance Task Force.

Information security or IT security?

 One would think that these two terms are synonyms – after all, isn’t information security all about computers?

IT Governance Guide

This IT Governance guide provides a template to understand and strengthen controls over information technology. It focuses on IT Security and related areas.

IT Security Basics

An overview of information technology security - define information security, detail functional areas, discuss security standards and regulations, describe testing techniques for IT security audits, and information security organization maturity leve...

ITIL V3 and Information Security

This paper discusses the role and importance of effective Information Security Management (ISM), how it is supported by an extensive family of global standards and the way these harmonize with ITIL

Making the Case for Network Security Compliance

Performing an Information Security Assessment

This presentation describes the steps in performing an information security assessment - what are the critical security goals and objectives? what are the documentation requirements? how to incorporate regulatory requirements? how to gather data to ...

Simple Ways to Avoid Data Breaches

This presentation provides an overview of data breaches - what is a data breach? - provides a measure of the loss suffered as a result of one, discusses the cause of data breaches, and recommends the most common/easy/obvious way to bridge data breac...

Top Action Steps for Information Security Managers

"This publication is designed for Certified Information Security Managers (CISMs), Chief Information Security Officers (CISOs) and information security managers to use as action steps in addressing the questions posed by the 2001 ITGI publication In...

Using CobiT to Enhance IT Security Governance

Very good discussion on using COBIT for IT Security Governance.

What is Information Security Governance?

 This presentation provides a definition for information security governance and how to implement it in your organization.

What is Information Security Governance?

This quick introduction to information security governance also covers tips on implementing it successfully.

What the Board Needs to Know about Information Security Governance

This paper provides an overview of information security governance for the board of directors so "the board can provide a level of needed oversight to this vital business function that is adequate and necessary, and in doing so, exercise its essenti...


Posted on 08/26/2010 by


Why Information Security Governance? author Webmaster1

Webmaster1




Signup

For ThoughtLeader

CIO Index

Our Focus is On Your Agenda

CIO Index is the world's largest professional network for CIOs - of the CIO, for the CIO, by the CIO. 

Over 75,000 CIOs and other IT Executives use CIO Index to Learn, Network and Share.

 

Cioindex, Inc.

  • (+1) 800-309-3550
  • Mon - Fri 9:00am - 5:00 pm
  • 375 North Stephanie St., Ste 1411, Henderson, NV 89014