5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Aspire     Security Essentials for Decision-makers and Leaders     Security Essentials - Track 3: Mitigating Security Risks
Adequate risk management requires the policies, procedures, standards, and guidelines that encompass effective information security governance are in place. This course shows you how to incorporate security governance as part of a robust security strategy.
Examine the many security governance elements. Outline how to design, implement, and continually evaluate your strategy based on best practices. Define how security governance relates to the CIA Triad and distinguish between security governance and security management. Furthermore, investigate IT governance frameworks and compare centralized, decentralized, and hybrid structures.
After taking this course, you'll recognize what's needed to implement a sound and robust information security governance strategy at your organization.

Objectives

Mitigating Security Risks: Information Security Governance

  • discover the key concepts covered in this course
  • define information security governance
  • describe why security governance is needed
  • list the benefits of security governance
  • outline the relationship between security governance and the CIA Triad
  • list the desired outcomes of security governance
  • compare security governance and security management
  • list the elements of security governance
  • define the role and importance of security policies, procedures, standards, and guidelines
  • list the types of IT governance frameworks
  • describe the role of senior management in security governance
  • describe methods to create and deliver governance
  • describe the senior management roles and responsibilities in security governance
  • list methods to review governance
  • describe the signs of security governance
  • outline some examples of missing governance
  • list the reasons for ineffective security governance
  • list some security governance best practices and outline the method to implement security governance
  • list and describe the components of the security governance structure
  • summarize the key concepts covered in this course