Mitigating Security Risks: Information Security Governance

placeholder

Adequate risk management requires the policies procedures standards and guidelines that encompass effective information security governance are in place. This course shows you how to incorporate security governance as part of a robust security strategy. Examine the many security governance elements. Outline how to design implement and continually evaluate your strategy based on best practices. Define how security governance relates to the CIA Triad and distinguish between security governance and security management. Furthermore investigate IT governance frameworks and compare centralized decentralized and hybrid structures. After taking this course youll recognize whats needed to implement a sound and robust information security governance strategy at your organization.