Find Resources and
Connect with members on topics that interest you.
Please sign in to see your topics.
You must be logged in and be a member of this group* to participate.*After logging in click "Join this Community" to the right and then return to this page by clicking the back button. As a member of this topic you can now view this and other discussions from the topic homepage.
This article is the final article of a 4-part “Leveraging COBIT to Implement Information Security” series. Part 1 covered how COBIT® 5 can be used to establish the overall framework for the collaboration of technical standards such as the IT Infrastructure Library (ITIL), ISO/IEC 27001 and SANS Critical Security Controls (SANS Top 20). Part 2 focused on using COBIT® to implement information security process controls within an ITIL system to provide protection envisaged by SANS Top 20. Part 3 outlined how to implement the Information Security Management System (ISMS) governance framework and enabling tools to manage the security programme. This article shows how the requirements for certification of the ISMS framework can be satisfied by using the approaches outlined in this 4-part series.
You must login to leave a comment.
You must be a logged in to start a discussion.