Mitigating Security Risks: Information Security Governance

IT Security    |    Intermediate
  • 20 Videos | 1h 32m 7s
  • Includes Assessment
  • Earns a Badge
Adequate risk management requires the policies, procedures, standards, and guidelines that encompass effective information security governance are in place. This course shows you how to incorporate security governance as part of a robust security strategy. Examine the many security governance elements. Outline how to design, implement, and continually evaluate your strategy based on best practices. Define how security governance relates to the CIA Triad and distinguish between security governance and security management. Furthermore, investigate IT governance frameworks and compare centralized, decentralized, and hybrid structures. After taking this course, you'll recognize what's needed to implement a sound and robust information security governance strategy at your organization.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    define information security governance
    describe why security governance is needed
    list the benefits of security governance
    outline the relationship between security governance and the CIA Triad
    list the desired outcomes of security governance
    compare security governance and security management
    list the elements of security governance
    define the role and importance of security policies, procedures, standards, and guidelines
    list the types of IT governance frameworks
  • describe the role of senior management in security governance
    describe methods to create and deliver governance
    describe the senior management roles and responsibilities in security governance
    list methods to review governance
    describe the signs of security governance
    outline some examples of missing governance
    list the reasons for ineffective security governance
    list some security governance best practices and outline the method to implement security governance
    list and describe the components of the security governance structure
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 43s
    UP NEXT
  • Playable
    2. 
    Information Security Governance
    2m 42s
  • Locked
    3. 
    The Need for Security Governance
    4m 55s
  • Locked
    4. 
    The Benefits of Security Governance
    4m 38s
  • Locked
    5. 
    Security Governance and the CIA Triad
    2m 33s
  • Locked
    6. 
    Security Governance Outcomes
    2m 19s
  • Locked
    7. 
    Security Governance vs. Security Management
    3m 34s
  • Locked
    8. 
    The Elements of Security Governance
    6m 1s
  • Locked
    9. 
    The Role of a Security Policy
    2m 54s
  • Locked
    10. 
    IT Governance Frameworks
    12m 56s
  • Locked
    11. 
    The Role of Senior Management in Security Governance
    7m 15s
  • Locked
    12. 
    Methods to Create and Deliver Governance
    6m 33s
  • Locked
    13. 
    Senior Management Roles and Responsibilities
    5m 15s
  • Locked
    14. 
    Methods to Review Governance
    3m 43s
  • Locked
    15. 
    Signs of Security Governance
    3m 50s
  • Locked
    16. 
    Missing Security Governance
    2m 55s
  • Locked
    17. 
    Reasons for Ineffective Security Governance
    2m 35s
  • Locked
    18. 
    Methods to Implement Security Governance
    3m 5s
  • Locked
    19. 
    The Security Governance Structure
    2m 3s
  • Locked
    20. 
    Course Summary
    1m 38s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.