ABSTRACT

This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.

chapter

Introduction

chapter Chapter 1|20 pages

Security Governance

chapter Chapter 2|32 pages

Security Governance Control Framework

chapter Chapter 3|18 pages

Control Framework Use Cases

chapter Chapter 4|24 pages

Strategy

chapter Chapter 5|16 pages

Policies

chapter Chapter 6|24 pages

Organization

chapter Chapter 7|28 pages

Risk Management

chapter Chapter 8|16 pages

Program Management

chapter Chapter 9|20 pages

Security Metrics

chapter Chapter 10|18 pages

Reporting and Oversight

chapter Chapter 11|14 pages

Asset Management

chapter Chapter 12|12 pages

Compliance