ITIL V3 and Information Security

This paper discusses the role and importance of effective Information Security Management (ISM), how it is supported by an extensive family of global standards and the way these harmonize with ITIL


The paper discusses the contents and purposes of, and relationships between global standards, best practice guidance and organizational policies and procedures in the creation of effective ISM. There is no longer a separate ITIL publication on Security Management, so the paper explores the role of ISM within ITIL and how ITIL and the available ISM standards and guidance are aligned and can work together. ISM content in ITIL is mapped to the ISO/IEC standards. 

In Appendix D, the paper summarizes the key findings of the committees set up to examine recent serious security failings in the public sector. Their recommendations are valuable and as applicable to commercial business as they are to Government departments.

Download (please login and scroll down)

Download Document: Documents are in common file formats such as Microsoft Word (doc), Powerpoint (ppt), Excel (xls,csv,xlsx), and Adobe pdf.
Download


Related Categories




Related Topics




Related Articles


A Guide to IT Security Governance

This paper highlights the critical role of security governance. It answers key questions about governing IT Security in your enterprise. Very Good Read!

A Framework for Information Security and Business Alignment

This presentation discusses a framework for information security and business alignment - the extent to which the ISEC function is integrated into the rest of the business organization

A Framework for Information Security Governance

This paper proposes a preliminary framework for information security governance that builds on the lessons of Federal Information Security Management Act (FISMA) and ISO 17799.

A Guide to ITIL

A soup to nuts guide on ITIL

An Executive Level Overview of ITIL

 This presentation provides an overview of ITIL for senior leaders/executives

An Introduction to ITIL

An Overview of ITIL

 "Everything you wanted to know about ITIL in less than one thousand words"

Audit Like a Hacker

This presentation guides you through a security audit from a different perspective - that of a hacker who focuses on "value" among other things.

Combining COBIT and ITIL for IT Governance

Should you use Cobit or ITIL or both? This paper provides a good start on thinking about using them both to get the maximum bang for your buck. Good read!

Five Best Practices for ITIL Implementation

This white paper is designed to provide insight into the most common hurdles faced by organizations when implementing ITIL best practice and includes practical steps on how to overcome them.

Identity Lifecycle Management

This presentation discusses the security challenges facing an enterprise, the cost of breaches, the need for and cost of compliance and then proposes using identity lifecycle management as a solution to address these challenges.

Implementing ITIL

This presentation discusses the trends accelerating the adoption of ITIL and the best practices to maximize business results in ITIL implementations.

Implementing ITIL Best Practices

This whitepaper discusses ITIL implementation best practices.

Information Security Governance

This presentation provides information security governance guidance for information security managers.

Information Security Governance Assessment Tool

 This paper presents an information security governance assessment tool based upon the information security governance (ISG) framework recommended by the Corporate Governance Task Force.

Information security or IT security?

 One would think that these two terms are synonyms – after all, isn’t information security all about computers?

Introduction to ITIL

Introduction to ITIL provides an in depth review of key concepts in the framework and makes a connection between ITIL, CoBIT and ISO 17799

Introduction to ITIL V3

 Introduction to ITIL V3 provides a quick overview of ITIL, its objectives, key content areas, qualifications scheme, and core publications. The guide also discusses the key principles of IT Service Management.

IT Security Basics

An overview of information technology security - define information security, detail functional areas, discuss security standards and regulations, describe testing techniques for IT security audits, and information security organization maturity leve...

ITIL Background

ITIL background presentation provides an introduction, history and basics of the ITIL framework.

ITIL Primer

 ITIL primer provides a quick introduction to the framework and its key components

ITIL Quick Reference

 ITIL Quick Reference provides a detailed overview of the key elements of ITIL methodology.

ITIL Quick Reference Poster

  ITIL Quick Reference:  An excellent quick reference for anyone else wanting to get familiar with ITIL.  

ITIL Quick Reference Poster

ITIL Quick Reference poster provides a succinct overview of the key elements of ITIL methodology.

Making the Case for Network Security Compliance

Overview of ITIL V3

A very good overview of ITIL Version 3 - history, objectives, books, changes, training, certification, discussion on migration from V2 to V3... Good Read!

Performing an Information Security Assessment

This presentation describes the steps in performing an information security assessment - what are the critical security goals and objectives? what are the documentation requirements? how to incorporate regulatory requirements? how to gather data to ...

Risk assessment tips for smaller companies

I have seen quite a lot of smaller companies (up to 50 employees) trying to apply risk assessment tools as part of their ISO 27001 implementation project. The result is that it usually takes too much time and money with too little effect.

The evolving role of IT managers and CIOs

The 2010 IBM Global IT Risk Study revealed investing in IT risk management can provide significant business benefits

The Skinny on ITIL

The Skinny on ITIL

A very good presentation on ITIL V3. It provides an overview of ITIL V3, what has changed from V2 and what are the implications for practitioners.

Top Action Steps for Information Security Managers

"This publication is designed for Certified Information Security Managers (CISMs), Chief Information Security Officers (CISOs) and information security managers to use as action steps in addressing the questions posed by the 2001 ITGI publication In...

Using CobiT to Enhance IT Security Governance

Very good discussion on using COBIT for IT Security Governance.

What is Information Security Governance?

 This presentation provides a definition for information security governance and how to implement it in your organization.

What is Information Security Governance?

This quick introduction to information security governance also covers tips on implementing it successfully.

What Must Managers Know About ITIL?

This paper is a quick read on the 10 things that provide a better chance for an ITIL implementation to succeed.

What the Board Needs to Know about Information Security Governance

This paper provides an overview of information security governance for the board of directors so "the board can provide a level of needed oversight to this vital business function that is adequate and necessary, and in doing so, exercise its essenti...

Why Information Security Governance?

 This presentation discusses the business need for information security governance.




Posted on 03/10/2011 by


ITIL V3 and Information Security author Webmaster1

Webmaster1




Signup For ThoughtLeader









Subscribe


CIO Index

Our Focus is On Your Agenda

CIO Index is the world's largest professional network for CIOs - of the CIO, for the CIO, by the CIO. 

Over 70,000 CIOs and other IT Executives use CIO Index to Learn, Network and Share.

 

Cioindex, Inc.

  • (+1) 800-309-3550
  • Mon - Fri 9:00am - 5:00 pm
  • 115 Franklin Tpke, Mahwah, NJ 07430