Find Resources and Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

Subscribe to this discussion

COBIT Focus - Leveraging COBIT to Implement Information Security (Part 3)

Join author John Frisken, as he responds to ISACA member questions beginning 31 August 2015. Add your questions by responding to this post!

You must be logged in and be a member of this group* to participate.
*After logging in click "Join this Community" to the right and then return to this page by clicking the back button. As a member of this topic you can now view this and other discussions from the topic homepage.

This article is a continuation of the article originally published 4 May 2015 called ‘Leveraging COBIT to Implement Information Security’.Part 1 covered how COBIT® 5 can be used to establish the overall framework for the collaboration of technical standards such as the IT Infrastructure Library (ITIL)ISO/IEC 27001 and SANS Critical Security ControlsPart 2 focussed on using COBIT® to implement information security process controls within an ITIL system to provide protection envisaged by SANS Critical Security Controls. Part 3 looks at how to implement an information security management system (ISMS) governance framework and enable tools to manage the security program.

Read the rest of the article here
You must sign in to rate content.
(Unrated)

Comments

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 3)

Excellent article! Greetings.
David076Lively at 9/8/2015 9:43:35 AM Quote
You must sign in to rate content.
(1 ratings)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 3)

An out-of-office message containing personal information or a comment that violates community policies was deleted by the administrator.
SebastianLively at 9/8/2015 10:52:07 AM Quote
You must sign in to rate content.
(Unrated)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 3)

Thanks David,

Happy to answer any questions.
The final part of the series comes out early next month.

John
John072Lively at 9/9/2015 2:05:17 AM Quote
You must sign in to rate content.
(Unrated)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 3)

Thanks David,

Happy to answer any questions.
The final part of the series comes out early next month.

John
John072Lively at 9/9/2015 2:05:17 AM Quote
You must sign in to rate content.
(Unrated)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 3)

An out-of-office message containing personal information or a comment that violates community policies was deleted by the administrator.
SebastianLively at 9/8/2015 10:52:07 AM Quote
You must sign in to rate content.
(Unrated)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 3)

Excellent article! Greetings.
David076Lively at 9/8/2015 9:43:35 AM Quote
You must sign in to rate content.
(1 ratings)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 3)

Excellent article! Greetings.
David076Lively at 9/8/2015 9:43:35 AM Quote
You must sign in to rate content.
(1 ratings)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 3)

An out-of-office message containing personal information or a comment that violates community policies was deleted by the administrator.
SebastianLively at 9/8/2015 10:52:07 AM Quote
You must sign in to rate content.
(Unrated)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 3)

Thanks David,

Happy to answer any questions.
The final part of the series comes out early next month.

John
John072Lively at 9/9/2015 2:05:17 AM Quote
You must sign in to rate content.
(Unrated)

Leave a Comment

* required

You must login to leave a comment.