Case-Corporate Governance for Information system security
Need help writing a 4-5 page paper Using the COBIT material noted above and other related material, compose a short paper (3-5 pages without counting the cover and references) on the topic.
Use the COBIT/CMMI Pathway Tool to determine the Practice areas in which to include security in the governance framework and discuss the maturity level as well. You can develop a table to help with this paper.
The paper needs to be APA format, headings, Introduction, body, conclusion, and reference page.
Corporate Governance for Information System Security
IT corporate governance is used for enterprise risk management and best management practices. These governance policies and procedures enable the firms to institute best practices as well as be held accountable.
In this Case, you will review the principles of IT governance and information security governance using the practical and regulatory perspectives. First review this ISACA report.
ISACA (2012). COBIT Framework for IT Governance and Control. Available at
http://www.isaca.org/Knowledge-Center/cobit/Pages/Overview.aspx
Case Assignment
Using the COBIT material noted above and other related material, compose a short paper (4-5 pages without counting the cover and references) on the topic.
Use the COBIT/CMMI Pathway Tool to determine the Practice areas in which to include security in the governance framework and discuss the maturity level as well. You can develop a table to help with this paper.
Go to this site and use your Trident email address to register and download this COBIT/CMMI tool. You will need to register on the ISACA website – just use your Trident email address and you can freely download this tool.
http://bit.ly/2KTQvmQcmmi
Why should organizations incorporate security into their governance efforts?
Assignment Expectations
Please address the following issues:
· Security governance principles
· IT governance stakeholders
· IT governance justification to managers
· Role of IT security professionals in terms of governance
Address these questions and then integrate your thoughts into a well-organized answer to the primary question in a 4- to 5-page paper with 300 words per page.
Background readings:
August 24, 2019. Session 2 COBIT 2019 Overview by Yusuf Hashmi
Getting started in digital forensics
Gregory, P. H. (07/24/2019). CISM®: Certified information security manager all in one, McGraw-Hill. Chapter 2 and 3
Digital forensics full course
Information security governance
Information security governance (CISM)
https://www.youtube.com/watch?v=vT7FLp1Pg48
National Vulnerability Database: NIS Special Publication 800-53
https://nvd.nist.gov/800-53
Optional Reading
Iannarelli, J. G. and O’Shaughnessy, M. (2015). Information governance and security: Protecting and managing your company’s proprietary information. Butterworth-Heinemann. ISBN:9780128002476, Chapter 1 – 7. Available in the Trident Online Library.
Sigler, K. and Rainey, J. L. (2016). Securing an IT organization through governance, risk management, and audit. CRC Press. ISBN:9781498737319, Chapter 8 – 16. Available in the Trident Online Library