Goodreads helps you keep track of books you want to read.
Start by marking “Information Security Governance: Guidance For Boards Of Directors And Executive Management” as Want to Read:
Information Security Governance: Guidance For Boards Of Directors And Executive Management
Enlarge cover
Rate this book
Clear rating
Open Preview

Information Security Governance: Guidance For Boards Of Directors And Executive Management

3.5  ·  Rating Details ·  4 Ratings  ·  2 Reviews

To achieve effectiveness and sustainability in today s complex, interconnected world, information security must be addressed at the highest levels of the organization, not regarded as a technical specialty relegated to the IT department

Organizations today face a global revolution in governance that directly affects their information management practices. Following the hig

...more
ebook, 2nd Edition, 49 pages
Published 2006 by ISACA (first published 1st 2002)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Information Security Governance, please sign up.

Be the first to ask a question about Information Security Governance

Community Reviews

(showing 1-14)
filter  |  sort: default (?)  |  Rating Details
Alejandro Teruel
This is a dry, abstract, carefully worded and somewhat dated whitepaper introduction to information security governance written for members of boards of directors. As the paper puts it, such boards should provide strategic oversight regarding not just information security within IT, but within the enterprise, thus they should:
1. Understand the criticality of information and information security to the organisation;

2. Review investment in information security for alignment with the organisation s
...more
Robert Davis
Aug 22, 2010 Robert Davis rated it really liked it
"Information technology (IT) assets must be protected from external and internal activities detrimental to effective and efficient functionality." Through this publication, security professionals will acquire an appreciation for processes associated with ensuring an adequate information security program.
T.
T. rated it liked it
Aug 25, 2015
Little Lulu
Little Lulu rated it it was amazing
Apr 21, 2013
Rocky
Rocky added it
Mar 28, 2010
Siddeekh
Siddeekh marked it as to-read
Apr 27, 2013
Michala
Michala marked it as to-read
Sep 15, 2013
P Surendranath
P Surendranath marked it as to-read
Nov 11, 2013
Robert
Robert marked it as to-read
Jan 31, 2014
Namsaigon
Namsaigon marked it as to-read
Jan 29, 2015
Eugene Tkachev
Eugene Tkachev marked it as to-read
Feb 16, 2015
Tran Hung
Tran Hung marked it as to-read
Apr 28, 2016
Patchur White
Patchur White marked it as to-read
Aug 09, 2016
Ema Jones
Ema Jones marked it as to-read
Nov 24, 2016
There are no discussion topics on this book yet. Be the first to start one »

Share This Book