IT Security Governance

IT Security Governance page on CIO Index provides important information and resources on the topic - what is IT Security Governance?, articles on IT Security Governance, experts in IT Security Governance etc. Members are free to download IT Security Governance powerpoint presentations, excel spreadsheets, adobe pdf, word documents (login required), and view the profiles of or directly contact the IT Security Governance experts listed using in-messaging.

ITIL V3 and Information Security

This paper discusses the role and importance of effective Information Security Management (ISM), how it is supported by an extensive family of global standards and the way these harmonize with ITIL


Information Security Governance Assessment Tool

 This paper presents an information security governance assessment tool based upon the information security governance (ISG) framework recommended by the Corporate Governance Task Force.


Using CobiT to Enhance IT Security Governance

Very good discussion on using COBIT for IT Security Governance.


What is Information Security Governance?

 This presentation provides a definition for information security governance and how to implement it in your organization.


A Guide to IT Security Governance

This paper highlights the critical role of security governance. It answers key questions about governing IT Security in your enterprise. Very Good Read!


IT Security Basics

An overview of information technology security - define information security, detail functional areas, discuss security standards and regulations, describe testing techniques for IT security audits, and information security organization maturity levels. This presentation also presents case studies to illustrate theory being practiced.

ITIL Security Management

This presentation discusses security management within the context of ITIL. The author's basic premise is the ITIL is not used to implement security but its processes may lead to enhanced security controlled processes.

Information Security Governance

This presentation provides information security governance guidance for information security managers.


Introduction to Common Criteria Scheme (CCS)

This presentation introduces the Common Criteria Evaluation and Certification Scheme, or CCS - an independent evaluation and certification service for measuring the security assurance and functionality claims of Information and Communications Technology (ICT) products and systems. What is it? Why is it important to you?

Creating a Security Baseline for Windows

Security baselines allow companies to stay in compliance with industry standards and maintain a reasonable level of security assurance. This presentation discusses the creation of a security baseline for a windows based environment.

1 2 3Next
Sign Up For ThoughtLeader









Subscribe


CIO Index

Our Focus is On Your Agenda

CIO Index is the world's largest professional network for CIOs - of the CIO, for the CIO, by the CIO. 

Over 70,000 CIOs and other IT Executives use CIO Index to Learn, Network and Share.

 

Cioindex, Inc.

  • (+1) 800-309-3550
  • Mon - Fri 9:00am - 5:00 pm
  • 115 Franklin Tpke, Mahwah, NJ 07430