English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 50m | 232 MB
Prepare for the first domain of the Certified Information Security Manager (CISM) exam: Information Security Governance. CISM certification validates your expertise in information security. A key part of that is governance, which ensures your team’s work is aligned with business objectives and external requirements. This course covers all the material in the domain, including implementing an information security strategy, developing a governance framework, and integrating that framework into corporate governance practices. Instructor Mike Chapple also covers developing policies, business cases, and other key components of a security governance program.
Topics include:
- Designing an information security strategy
- Aligning security with the business
- Security roles and responsibilities
- Security standards
- Budgeting for security
- Governance
- Policies
- Data security
- Obtaining leadership support
- Assessing security programs
- Security principles
Table of Contents
Introduction
1 Information security governance
2 What you need to know
Information Security Strategy
3 The goals of information security
4 Designing an information security strategy
5 Aligning security with the business
6 Strategic influences
7 Organizational processes
8 Security roles and responsibilities
Industry Standards
9 Control frameworks
10 Developing security baselines
11 Leveraging industry standards
12 Customizing security standards
Security Budgeting
13 Developing a security budget
14 Capital vs. operational expenses
15 Budget monitoring and reporting
Security Governance
16 Information security governance
17 Security governance frameworks
Security Policies
18 Security policy framework
19 Security policies
Data Security
20 Understanding data security
21 Data security policies
22 Data security roles
23 Data privacy
24 Limiting data collection
25 Privileged account management
Navigating the Organization
26 Organizational structure
27 Obtaining leadership support
Assessing Security Programs
28 Collecting security process data
29 Management review and approval
30 Security metrics
31 Audits and assessments
32 Control management
Security Principles
33 Need to know and least privilege
34 Separation of duties and responsibilities
Conclusion
35 What s next
Resolve the captcha to access the links!