Topic: information security governance guidance

IT Security Metrics Guide

This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and procedures. It provides an approach to help management decide where to invest in additional security protection resources or identify and evaluate nonproductive controls. It explains the metric development and implementation process and how it can also be used to adequately justify security control investments. The results of an effective metric program can provide useful data for directing the allocation of information security resources and should simplify the preparation of performance-related reports. (100 pages)

Introduction to IT Security Governance

This presentation introduces information technology governance and information security governance and key concepts related to them – what is IT governance? what is IT security governance? what is the IT security Governance framework? what are some leading practices in implementing IT security governance?

Prioritizing IT Security Investments

This document provides guidance on integrating IT security and IT Investment Management processes. Applying funding towards high-priority security investments supports the objective of maintaining appropriate security controls, both at the enterprise-wide and system level, commensurate with levels of risk and data sensitivity. This paper introduces common criteria against which managers can prioritize security activities to ensure that corrective actions are incorporated into the capital planning process to deliver maximum security in a cost-effective manner. (70 Pages)

Introduction to Common Criteria Scheme (CCS)

This presentation introduces the Common Criteria Evaluation and Certification Scheme, or CCS – an independent evaluation and certification service for measuring the security assurance and functionality claims of Information and Communications Technology (ICT) products and systems. What is it? Why is it important to you?

Security Risk Assessment

This paper discusses security risk analysis – what is security risk analysis? why perform a security risk assessment? how to conduct a security risk assessment? when to perform a security risk analysis?

IT Security Basics

An overview of information technology security – define information security, detail functional areas, discuss security standards and regulations, describe testing techniques for IT security audits, and information security organization maturity levels. This presentation also presents case studies to illustrate theory being practiced.

Automating ISO 27002

This presentation discusses technologies for implementing ISO 27002 processes and controls – which technologies to use? where to start?

Creating a Security Baseline for Windows

Security baselines allow companies to stay in compliance with industry standards and maintain a reasonable level of security assurance. This presentation discusses the creation of a security baseline for a windows based environment.

Top Action Steps for Information Security Managers

"This publication is designed for Certified Information Security Managers (CISMs), Chief Information Security Officers (CISOs) and information security managers to use as action steps in addressing the questions posed by the 2001 ITGI publication Information Security Governance: Guidance for Boards of Directors and Executive Management. "

Editor's Picks

Sample IT Strategy Plan

A good IT Strategy Plan that you can use as a template to create your own.

IT Strategy Presentation

This in-depth – 78 pages – presentation goes into just about everything you would have wanted to know about IT Strategy aka business IT alignment (ICT Strategy, IS strategy, IS strategic alignment, IT Alignment, strategic information systems planning (SISP)…)

IT Strategy Example

This is an in-depth information technology strategic planning example that details the process and framework that CIOs can adapt to give direction to their own IT Organizations. Excellent Read!! (200 pages)

IT Strategy Template

Use this template to create an IT strategic plan for your organization – aligning business with IT strategy. IT Strategy Template can be downloaded for free by CIO Index members.

7 Steps to Business and IT Alignment

No business will ever reach the goal of “business and IT alignment”. Should this discourage you from pursuing business and IT alignment? NO! It is a worthy goal to pursue. Indeed, it is a critical one to pursue. You might never reach alignment but you can take steps to get ever closer. This requires a process. Often, we ignore the fact that business and IT alignment is a process. This process does not have a starting point nor does it have an end. It is a series of “learn and do” cycles that incrementally get towards alignment. Let me explain.

CIO Newsletters

Copyright ©  2020  CIO Portal. All rights reserved.