COBIT Security Baseline
Title | COBIT Security Baseline PDF eBook |
Author | IT Governance Institute |
Publisher | ISACA |
Pages | 50 |
Release | 2007 |
Genre | Business enterprises |
ISBN | 1933284811 |
This guide, based on COBIT 4.1, consists of a comprehensive set of resources that contains the information organizations need to adopt an IT governance and control framework. COBIT covers security in addition to all the other risks that can occur with the use of IT. COBIT Security Baseline focuses on the specific risk of IT security in a way that is simple to follow and implement for the home user or the user in small to medium enterprises, as well as executives and board members of larger organizations.
Controls & Assurance in the Cloud: Using COBIT 5
Title | Controls & Assurance in the Cloud: Using COBIT 5 PDF eBook |
Author | ISACA |
Publisher | ISACA |
Pages | 266 |
Release | 2014-03-24 |
Genre | Technology & Engineering |
ISBN | 1604204648 |
"This practical guidance was created for enterprises using or considering using cloud computing. It provides a governance and control framework based on COBIT 5 and an audit program using COBIT 5 for Assurance. This information can assist enterprises in assessing the potential value of cloud investments to determine whether the risk is within the acceptable level. In addition, it provides a list of publications and resources that can help determine if cloud computing is the appropriate solution for the data and processes being considered."--
COBIT 5 for Information Security
Title | COBIT 5 for Information Security PDF eBook |
Author | ISACA |
Publisher | ISACA |
Pages | 220 |
Release | 2012 |
Genre | Business & Economics |
ISBN | 1604202548 |
COBIT 5 provides a comprehensive framework that assists enterprises in achieving their objectives for the governance and management of enterprise IT. COBIT 5 enables IT to be governed and managed in a holistic manner for the entire enterprise, taking into account the full end-to-end business and IT functional areas of responsibility, considering IT-related interests of internal and external stakeholders.
Securing an IT Organization through Governance, Risk Management, and Audit
Title | Securing an IT Organization through Governance, Risk Management, and Audit PDF eBook |
Author | Ken E. Sigler |
Publisher | CRC Press |
Pages | 239 |
Release | 2016-01-05 |
Genre | Business & Economics |
ISBN | 1040070957 |
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing the processes directly related to governance, risk management, and audit, the book maps the CSF steps and activities to the methods defined in COBIT 5, extending the CSF objectives with practical and measurable activities that leverage operational risk understanding in a business context. This allows the ICT organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models.
Security, Audit and Control Features
Title | Security, Audit and Control Features PDF eBook |
Author | |
Publisher | |
Pages | 52 |
Release | 2012 |
Genre | Computers |
ISBN | 1604201975 |
Etwas über die jetzige innere Verfassung der Herrnhuter
Title | Etwas über die jetzige innere Verfassung der Herrnhuter PDF eBook |
Author | |
Publisher | |
Pages | |
Release | 1788 |
Genre | |
ISBN |
COBIT Mapping
Title | COBIT Mapping PDF eBook |
Author | ITGI |
Publisher | ISACA |
Pages | 58 |
Release | 2007 |
Genre | Technology & Engineering |
ISBN | 1604200340 |