Find Resources and Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

Subscribe to this discussion

COBIT Focus - Leveraging COBIT to Implement Information Security (Part 4)

Join author John Frisken, as he responds to ISACA member questions beginning 5 October 2015. Add your questions by responding to this post!

You must be logged in and be a member of this group* to participate.
*After logging in click "Join this Community" to the right and then return to this page by clicking the back button. As a member of this topic you can now view this and other discussions from the topic homepage.

This article is the final article of a 4-part “Leveraging COBIT to Implement Information Security” series. Part 1 covered how COBIT® 5 can be used to establish the overall framework for the collaboration of technical standards such as the IT Infrastructure Library (ITIL), ISO/IEC 27001 and SANS Critical Security Controls (SANS Top 20). Part 2 focused on using COBIT® to implement information security process controls within an ITIL system to provide protection envisaged by SANS Top 20. Part 3 outlined how to implement the Information Security Management System (ISMS) governance framework and enabling tools to manage the security programme. This article shows how the requirements for certification of the ISMS framework can be satisfied by using the approaches outlined in this 4-part series.

Read the rest of the article here
You must sign in to rate content.
(Unrated)

Comments

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 4)

An out-of-office message containing personal information or a comment that violates community policies was deleted by the administrator.
okingLively at 10/1/2015 2:39:07 PM Quote
You must sign in to rate content.
(Unrated)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 4)

Great article John - and thanks for sharing.
Security in the Cloud and Security as a Service are making great strides too - evolution over the near term will be fascinating...

Regards
Russ
Russ RaizenbergObserver at 11/17/2015 7:50:20 AM Quote
You must sign in to rate content.
(Unrated)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 4)

Great article John - and thanks for sharing.
Security in the Cloud and Security as a Service are making great strides too - evolution over the near term will be fascinating...

Regards
Russ
Russ RaizenbergObserver at 11/17/2015 7:50:20 AM Quote
You must sign in to rate content.
(Unrated)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 4)

An out-of-office message containing personal information or a comment that violates community policies was deleted by the administrator.
okingLively at 10/1/2015 2:39:07 PM Quote
You must sign in to rate content.
(Unrated)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 4)

An out-of-office message containing personal information or a comment that violates community policies was deleted by the administrator.
okingLively at 10/1/2015 2:39:07 PM Quote
You must sign in to rate content.
(Unrated)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 4)

Great article John - and thanks for sharing.
Security in the Cloud and Security as a Service are making great strides too - evolution over the near term will be fascinating...

Regards
Russ
Russ RaizenbergObserver at 11/17/2015 7:50:20 AM Quote
You must sign in to rate content.
(Unrated)

Leave a Comment

* required

You must login to leave a comment.