Chapter

Information Security Governance Collection – Page 3

Audit Like a Hacker

This presentation guides you through a security audit from a different perspective – that of a hacker who focuses on "value" among other things.

Improving Information Security Compliance

This paper presents a process-oriented approach to manage organizational change needed to improve information security compliance. The approach uses Business Aligned Information Security  anagement (BAISeM) and principles that have been derived from standards like ITIL, CObIT and ISO 27001. In order to illustrate the approach, the context of IT service continuity is selected as an example.

Top Action Steps for Information Security Managers

"This publication is designed for Certified Information Security Managers (CISMs), Chief Information Security Officers (CISOs) and information security managers to use as action steps in addressing the questions posed by the 2001 ITGI publication Information Security Governance: Guidance for Boards of Directors and Executive Management. "

What the Board Needs to Know about Information Security Governance

This paper provides an overview of information security governance for the board of directors so "the board can provide a level of needed oversight to this vital business function that is adequate and necessary, and in doing so, exercise its essential duty of care."<br />
<br />
<span style="background-color: rgb(255, 255, 153); ">Dated Material</span>

ITIL V3 and Information Security

This paper discusses the role and importance of effective Information Security Management (ISM), how it is supported by an extensive family of global standards and the way these harmonize with ITIL

CIO Portal