CISM 2020: Information Security & Business Process Alignment

placeholder

“Proper IT governance starts with aligning IT solutions with business processes. In this course you ll explore how to identify the relationship between IT security and business objectives.
You ll examine in detAIl how various regulations and security standards such as HIPAA GDPR and PCI DSS can influence an organization s IT security decisions going through seven of such regulations one-by-one.
Next you ll examine the cloud services Infrastructure as a Service (IaaS) Platform as a Service (PaaS) and Software as a Service (SaaS) to determine how responsibility is divided between provider and consumer.
Lastly you ll investigate several public cloud providers security accreditations. This course is part of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.”