New guide launched for security managers

By

IT certifications organisation the Information Systems Audit and Control Association (ISACA) today launched a guide designed to provide IT security chiefs with an independent framework to help manage their information security more effectively.


IT certifications organisation the Information Systems Audit and Control Association (ISACA) today launched a guide designed to provide IT security chiefs with an independent framework to help manage their information security more effectively.

An Introduction to the Business Model for Information Security explains the new business model, which is independent of any particular technology.

The framework can be applied across all industries, countries and regulatory/legal systems, and covers information security, privacy, risk, physical security and compliance issues, according to ISACA. It includes advice on aligning IT security programme activities with organisational goals and priorities, and increasing the value of security activities to the enterprise.

"This is ISACA's first step in transforming the theoretical model into a practical tool that can be used by information security practitioners to unify security initiatives with the business mission," said Kent Anderson, a member of ISACA's Security Management Committee.

"The ISACA model is valuable guidance because it takes a strong business-oriented approach, focusing on people and processes rather than on technology."

ISACA will release a practitioners' guide and an executives' guide later in the year.
Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:

Most Read Articles

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

"Widespread data theft" hits Salesforce customers via third party

"Widespread data theft" hits Salesforce customers via third party

Attackers weaponise Linux file names as malware vectors

Attackers weaponise Linux file names as malware vectors

Home Affairs adds SecOps to new cyber risk overhaul

Home Affairs adds SecOps to new cyber risk overhaul

Log In

  |  Forgot your password?