New guide launched for security managers

By

IT certifications organisation the Information Systems Audit and Control Association (ISACA) today launched a guide designed to provide IT security chiefs with an independent framework to help manage their information security more effectively.


IT certifications organisation the Information Systems Audit and Control Association (ISACA) today launched a guide designed to provide IT security chiefs with an independent framework to help manage their information security more effectively.

An Introduction to the Business Model for Information Security explains the new business model, which is independent of any particular technology.

The framework can be applied across all industries, countries and regulatory/legal systems, and covers information security, privacy, risk, physical security and compliance issues, according to ISACA. It includes advice on aligning IT security programme activities with organisational goals and priorities, and increasing the value of security activities to the enterprise.

"This is ISACA's first step in transforming the theoretical model into a practical tool that can be used by information security practitioners to unify security initiatives with the business mission," said Kent Anderson, a member of ISACA's Security Management Committee.

"The ISACA model is valuable guidance because it takes a strong business-oriented approach, focusing on people and processes rather than on technology."

ISACA will release a practitioners' guide and an executives' guide later in the year.
Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:

Most Read Articles

Phishing attack nets enormous npm supply chain compromise

Phishing attack nets enormous npm supply chain compromise

VicRoads to phase out passwords in favour of passkeys

VicRoads to phase out passwords in favour of passkeys

Service NSW centralises security, networking in mammoth CloudOps overhaul

Service NSW centralises security, networking in mammoth CloudOps overhaul

Apple adds "mercenary spyware" protection to new A19 chip

Apple adds "mercenary spyware" protection to new A19 chip

Log In

  |  Forgot your password?