Developing an Information Technology Risk Management
This in-depth presentation provides a step by step guide to implementing an information technology risk management program
This in-depth presentation provides a step by step guide to implementing an information technology risk management program
This overview explores the critical aspects of Information Security Governance, offering insights on aligning security with business strategy, managing risks, and ensuring compliance. CIOs and IT leaders will find valuable guidance on integrating security into their overall governance framework.
This presentation discusses the business need for information security governance. Why Information Security Governance? The following topics are discussed: What is information security governance? Why is information security governance important? What are the key business drivers for information security governance? An example of information security governance at work A discussion
Introducing a comprehensive Information Security Governance Assessment Tool, designed for CIOs to gain a high-level view of key security vulnerabilities. Based on the recommended ISG framework, this tool aids in aligning IT security with business objectives, ensuring a robust and compliant security posture.
Discover how to make the right enterprise architecture choices for your organization. This is a comparison of Zachman, TOGAF, IAF, and MDA frameworks to guide CIOs in optimizing resource allocation, governance, and scalability.
Security threats and solutions for both Cloud Computing and On-premises environment.
eThreats and Countermeasures: Just When You Thought It Was Safe to Go Out. Volume 6 of Digital Trust: IT security as a Technology Strategy series.
  Virtualization Security describes the issues and possible solutions to deal with security vulnerabilities in a virtualized environment.
This excellent study done by Deloitte highlights the growing issues with information security – the threats are increasing as companies are slowing their investments.
Explore the SABSA® methodology for aligning security architecture with business objectives. This whitepaper presents the SABSA methodology, explains its benefits, and compares them to the classical EA methodology.