This presentation introduces information technology governance and information security governance and key concepts related to them – what is IT governance? what is IT security governance? what is the IT security Governance framework? what are some leading practices in implementing IT security governance?
Topic: IT Security Governance
This document provides guidance on applying the IT Security Assessment Framework – establishes five levels of standardized security status and criteria – by identifying 17 control areas, such as those pertaining to identification and authentication and contingency planning. In addition, the guide provides control objectives and techniques that can be measured for each area. (100 Pages)
This presentation introduces the Common Criteria Evaluation and Certification Scheme, or CCS – an independent evaluation and certification service for measuring the security assurance and functionality claims of Information and Communications Technology (ICT) products and systems. What is it? Why is it important to you?
This paper discusses security risk analysis – what is security risk analysis? why perform a security risk assessment? how to conduct a security risk assessment? when to perform a security risk analysis?
Arguing that in some organization boundaries between IT Governance, Accounting, BPM and Security Administration are blurring, the author highlights key mega trends driving this convergence and discusses some points to consider when making the move yourself.
This presentation paints a picture of the emerging threats to the worldwide payment processing systems and discusses how a major payment processor – Visa – works to keep its payment network secure from increasingly sophisticated attacks.
This presentation discusses information security and compliance risk management – what is it? why do it? – and introduces a framework to implement it in the healthcare industry.
This presentation discusses the imperatives for and the framework and process needed to setup an incident response program.
This presentation discusses security management within the context of ITIL. The author’s basic premise is the ITIL is not used to implement security but its processes may lead to enhanced security controlled processes.<br />
An overview of information technology security – define information security, detail functional areas, discuss security standards and regulations, describe testing techniques for IT security audits, and information security organization maturity levels. This presentation also presents case studies to illustrate theory being practiced.
A framework for business IT alignment.
A good IT Strategy Plan that you can use as a template to create your own.
This in-depth – 78 pages – presentation goes into just about everything you would have wanted to know about IT Strategy aka business IT alignment (ICT Strategy, IS strategy, IS strategic alignment, IT Alignment, strategic information systems planning (SISP)…)
This is an in-depth information technology strategic planning example that details the process and framework that CIOs can adapt to give direction to their own IT Organizations. Excellent Read!! (200 pages)
Use this template to create an IT strategic plan for your organization – aligning business with IT strategy. IT Strategy Template can be downloaded for free by CIO Index members.
CIOs can use this step-by-step guide to improve business IT alignment.
There are many definitions of IT Strategy. Which one is true?