It can be stated that access control is the very heart of an information security program, and, therefore, it is a core responsibility of an information security manager. In this course, Information Security Governance for the CISM, you’ll learn to implement appropriate governance principles and security concepts into an organization. First, you’ll explore the nature of governance and its differentiation from management. Next, you’ll discover how to develop an enterprise-wide governance program. Finally, you’ll learn how to identify and comply with the factors of law, regulation and organizational culture in development of adequate oversight for the information security program. When you’re finished with this course, you’ll have the skills and knowledge of information security governance needed for the Certified Information Security Manager exam.
Overview
It can be stated that access control is the very heart of an information security program, and, therefore, it is a core responsibility of an information security manager. In this course, Information Security Governance for the CISM, you’ll learn to implement appropriate governance principles and security concepts into an organization. First, you’ll explore the nature of governance and its differentiation from management. Next, you’ll discover how to develop an enterprise-wide governance program. Finally, you’ll learn how to identify and comply with the factors of law, regulation and organizational culture in development of adequate oversight for the information security program. When you’re finished with this course, you’ll have the skills and knowledge of information security governance needed for the Certified Information Security Manager exam.
Syllabus
- Course Overview 1min
- Enterprise Governance 67mins
- Information Security Strategy 35mins
- Course Summary 6mins
Taught by
Kevin Henry