Find Resources and Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

Subscribe to this discussion

COBIT Focus - Transforming Risk Culture Through Organizational Culture Leveraging COBIT 5 for Risk

Join authors Ganapathy Kannan and Vinoth Sivasubramanian, as they respond to ISACA member questions beginning 5 July 2016. Add your questions by responding to this post!

You must be logged in and be a member of this group* to participate 
*After logging in click "Join this Community" to the right and then return to this page by clicking the back button. As a member of this topic you can now view this and other discussions from the topic homepage.


The point has been made again and again and, as per the Forcepoint 2016 Global Threat Report, humans are still the weakest link in security. It is, therefore, essential that information security professionals acknowledge and address this problem. Resolving problems within the human workforce is complex, challenging and daunting, but it is definitely not an insurmountable task.

Addressing modern workplace and workforce challenges, coupled with the growing threat landscape, requires dynamic, out-of-the-box approaches. Traditional approaches such as deploying learning management solutions or conducting a one-day workshop on information security no longer solve the problem. To effectively create and implement a culture that clearly understands the risk and is open to managing risk factors, the people in an organization and the environment in which they are operating must effectively support information security strategies and objectives. This article discusses how to develop and implement a behavioral competency model that enables achievement of information security objectives and describes how COBIT 5 can be leveraged to build and model information security behaviors.

Read the rest of the article here

You must sign in to rate content.
(Unrated)

Comments

There are no comments yet for this post.

Leave a Comment

* required

You must login to leave a comment.