Find Resources and
Connect with members on topics that interest you.
Please sign in to see your topics.
You must be logged in and be a member of this group* to participate.*After logging in click "Join this Community" to the right and then return to this page by clicking the back button. As a member of this topic you can now view this and other discussions from the topic homepage.
This article is a continuation of the article published 4 May 2015 called “Leveraging COBIT to Implement Information Security (Part 1).”
Studies by many organisations have highlighted that companies that are remaining secure are focusing on implementing security controls as an integral part of their IT service management (ITSM) systems, not as stand-alone management systems. Companies that practice configuration management and maintain careful inventories of their hardware and software are staying secure. Those that do not have significantly higher risk, as borne out by security incident studies.
Many of the items managed within infrastructure management are significant for information security for 2 main reasons:
You must login to leave a comment.
You must be a logged in to start a discussion.