Find Resources and
Connect with members on topics that interest you.
Please sign in to see your topics.
You must be logged in and be a member of this group* to participate.*After logging in click "Join this Community" to the right and then return to this page by clicking the back button. As a member of this topic you can now view this and other discussions from the topic homepage.
This article is a continuation of the article originally published 4 May 2015 called ‘Leveraging COBIT to Implement Information Security’.Part 1 covered how COBIT® 5 can be used to establish the overall framework for the collaboration of technical standards such as the IT Infrastructure Library (ITIL), ISO/IEC 27001 and SANS Critical Security Controls. Part 2 focussed on using COBIT® to implement information security process controls within an ITIL system to provide protection envisaged by SANS Critical Security Controls. Part 3 looks at how to implement an information security management system (ISMS) governance framework and enable tools to manage the security program.
You must login to leave a comment.
You must be a logged in to start a discussion.