IT Security Governance

IT Security Governance page on CIO Index provides important information and resources on the topic - what is IT Security Governance?, articles on IT Security Governance, experts in IT Security Governance etc. Members are free to download IT Security Governance powerpoint presentations, excel spreadsheets, adobe pdf, word documents (login required), and view the profiles of or directly contact the IT Security Governance experts listed using in-messaging.

ITIL V3 and Information Security

This paper discusses the role and importance of effective Information Security Management (ISM), how it is supported by an extensive family of global standards and the way these harmonize with ITIL

Information Security Governance Assessment Tool

 This paper presents an information security governance assessment tool based upon the information security governance (ISG) framework recommended by the Corporate Governance Task Force.

Using CobiT to Enhance IT Security Governance

Very good discussion on using COBIT for IT Security Governance.

What is Information Security Governance?

 This presentation provides a definition for information security governance and how to implement it in your organization.

A Guide to IT Security Governance

This paper highlights the critical role of security governance. It answers key questions about governing IT Security in your enterprise. Very Good Read!

IT Security Basics

An overview of information technology security - define information security, detail functional areas, discuss security standards and regulations, describe testing techniques for IT security audits, and information security organization maturity levels. This presentation also presents case studies to illustrate theory being practiced.

Information Security Governance

This presentation provides information security governance guidance for information security managers.

ITIL Security Management

This presentation discusses security management within the context of ITIL. The author's basic premise is the ITIL is not used to implement security but its processes may lead to enhanced security controlled processes.

Creating a Security Baseline for Windows

Security baselines allow companies to stay in compliance with industry standards and maintain a reasonable level of security assurance. This presentation discusses the creation of a security baseline for a windows based environment.

Introduction to Common Criteria Scheme (CCS)

This presentation introduces the Common Criteria Evaluation and Certification Scheme, or CCS - an independent evaluation and certification service for measuring the security assurance and functionality claims of Information and Communications Technology (ICT) products and systems. What is it? Why is it important to you?

1 2 3Next
IT Management Courses
Sourabh Hajela, author, IT Strategy 101 Course
IT Strategy 101 Course
Learn the basics of business IT alignment
Sourabh Hajela, author, IT Strategy Course
IT Strategy Course
Learn how to create a strategic plan for IT
Gad Selig, author, IT Governance Course
IT Governance Course
Learn the basics of IT Governance
Jane Carbone, author, Enterprise Architecture Course
Enterprise Architecture Course
Learn how to create an enterprise architecture plan
Sign Up For ThoughtLeader


CIO Index

Our Focus is On Your Agenda

CIO Index is the world's largest professional network for CIOs - of the CIO, for the CIO, by the CIO. 

Over 75,000 CIOs and other IT Executives use CIO Index to Learn, Network and Share.


Cioindex, Inc.

  • (+1) 800-309-3550
  • Mon - Fri 9:00am - 5:00 pm
  • 375 North Stephanie St., Ste 1411, Henderson, NV 89014