Corporate Governance for Information System Security

by

Corporate Governance for Information System Security

IT corporate governance is used for enterprise risk management and best management practices. These governance policies and procedures enable the firms to institute best practices as well as be held accountable.

Never use plagiarized sources. Get Your Original Essay on
Corporate Governance for Information System Security
Hire Professionals Just from $11/Page
Order Now Click here

In this Case, you will review the principles of IT governance and information security governance using the practical and regulatory perspectives. First review this ISACA report.

ISACA (2012). COBIT Framework for IT Governance and Control. Available at  http://www.isaca.org/Knowledge-Center/cobit/Pages/Overview.aspx

Case Assignment

Using the COBIT material noted above and other related material, compose a short paper (4-5 pages without counting the cover and references) on the topic.

Use the COBIT/CMMI Pathway Tool to determine the Practice areas in which to include security in the governance framework and discuss the maturity level as well. You can develop a table to help with this paper.

Go to this site and use your Trident email address to register and download this COBIT/CMMI tool. You will need to register on the ISACA website – just use your Trident email address and you can freely download this tool. http://bit.ly/2KTQvmQcmmi

Why should organizations incorporate security into their governance efforts?

Assignment Expectations

Please address the following issues:

· Security governance principles

· IT governance stakeholders

· IT governance justification to managers

· Role of IT security professionals in terms of governance

Address these questions and then integrate your thoughts into a well-organized answer to the primary question in a  4- to 5-page paper with 300 words per page.

 

Background readings:

 

August 24, 2019. Session 2 COBIT 2019 Overview by Yusuf Hashmi https://www.youtube.com/watch?v=zAriyxTQBWI

Getting started in digital forensics https://www.youtube.com/watch?v=j3lgxdylktM

Gregory, P. H. (07/24/2019). CISM®: Certified information security manager all in one, McGraw-Hill. Chapter 2 and 3

Digital forensics full course https://www.youtube.com/watch?v=kDDdF2wyOF0&list=PL4gyeOPdriHdvfYOn70RMDGY8TK6vBLBG

Information security governance https://www.youtube.com/watch?v=ThaYLnEhqHo

Information security governance (CISM) https://www.youtube.com/watch?v=vT7FLp1Pg48

National Vulnerability Database: NIS Special Publication 800-53 https://nvd.nist.gov/800-53