Author: Alan Calder
Publisher: IT Governance Ltd
ISBN: 1787781690
Category : Business & Economics
Languages : en
Pages : 42
Book Description
This useful pocket guide is an ideal introduction for those wanting to understand more about ISO 38500. It describes the scope, application and objectives of the Standard and outlines its six core principles.
ISO/IEC 38500: A pocket guide, second edition
Author: Alan Calder
Publisher: IT Governance Ltd
ISBN: 1787781690
Category : Business & Economics
Languages : en
Pages : 42
Book Description
This useful pocket guide is an ideal introduction for those wanting to understand more about ISO 38500. It describes the scope, application and objectives of the Standard and outlines its six core principles.
Publisher: IT Governance Ltd
ISBN: 1787781690
Category : Business & Economics
Languages : en
Pages : 42
Book Description
This useful pocket guide is an ideal introduction for those wanting to understand more about ISO 38500. It describes the scope, application and objectives of the Standard and outlines its six core principles.
IT Governance
Author: Alan Calder
Publisher: Kogan Page Publishers
ISBN: 0749464860
Category : Business & Economics
Languages : en
Pages : 384
Book Description
For many companies, their intellectual property can often be more valuable than their physical assets. Having an effective IT governance strategy in place can protect this intellectual property, reducing the risk of theft and infringement. Data protection, privacy and breach regulations, computer misuse around investigatory powers are part of a complex and often competing range of requirements to which directors must respond. There is increasingly the need for an overarching information security framework that can provide context and coherence to compliance activity worldwide. IT Governance is a key resource for forward-thinking managers and executives at all levels, enabling them to understand how decisions about information technology in the organization should be made and monitored, and, in particular, how information security risks are best dealt with. The development of IT governance - which recognises the convergence between business practice and IT management - makes it essential for managers at all levels, and in organizations of all sizes, to understand how best to deal with information security risk. The new edition has been full updated to take account of the latest regulatory and technological developments, including the creation of the International Board for IT Governance Qualifications. IT Governance also includes new material on key international markets - including the UK and the US, Australia and South Africa.
Publisher: Kogan Page Publishers
ISBN: 0749464860
Category : Business & Economics
Languages : en
Pages : 384
Book Description
For many companies, their intellectual property can often be more valuable than their physical assets. Having an effective IT governance strategy in place can protect this intellectual property, reducing the risk of theft and infringement. Data protection, privacy and breach regulations, computer misuse around investigatory powers are part of a complex and often competing range of requirements to which directors must respond. There is increasingly the need for an overarching information security framework that can provide context and coherence to compliance activity worldwide. IT Governance is a key resource for forward-thinking managers and executives at all levels, enabling them to understand how decisions about information technology in the organization should be made and monitored, and, in particular, how information security risks are best dealt with. The development of IT governance - which recognises the convergence between business practice and IT management - makes it essential for managers at all levels, and in organizations of all sizes, to understand how best to deal with information security risk. The new edition has been full updated to take account of the latest regulatory and technological developments, including the creation of the International Board for IT Governance Qualifications. IT Governance also includes new material on key international markets - including the UK and the US, Australia and South Africa.
ITIL® 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond, second edition
Author: Claire Agutter
Publisher: IT Governance Ltd
ISBN: 1787782204
Category : Computers
Languages : en
Pages : 211
Book Description
ITIL® 4 Essentials contains everything you need to know to pass the ITIL 4 Foundation Certificate, plus more. It covers practices and concepts that are not addressed as part of the Foundation syllabus, making it ideal for newly qualified practitioners. This second edition has been updated to align with amendments to the ITIL® 4 Foundation syllabus.
Publisher: IT Governance Ltd
ISBN: 1787782204
Category : Computers
Languages : en
Pages : 211
Book Description
ITIL® 4 Essentials contains everything you need to know to pass the ITIL 4 Foundation Certificate, plus more. It covers practices and concepts that are not addressed as part of the Foundation syllabus, making it ideal for newly qualified practitioners. This second edition has been updated to align with amendments to the ITIL® 4 Foundation syllabus.
The TOGAF® Business Architecture Foundation Study Guide
Author: Andrew Josey
Publisher: Van Haren
ISBN: 9401810133
Category : Architecture
Languages : en
Pages : 255
Book Description
The TOGAF® Standard, a standard of The Open Group, is a proven Enterprise Architecture methodology and framework used by the world’s leading organizations to improve business efficiency. The TOGAF Certification Program has enabled more than 100,000 Enterprise Architects and trainers around the globe to demonstrate their proven knowledge of the framework and method. This is the book you need to prepare for the TOGAF Business Architecture Foundation qualification. This edition is aligned to the TOGAF Standard, 10th Edition. It includes an overview of every learning outcome included in the TOGAF Business Architecture Syllabus and in-depth coverage on preparing and taking the TOGAF Business Architecture Foundation examination. It includes Key Learning Points, exercises and challenging Test Yourself questions for each part of the syllabus, together with a Test Yourself examination paper that you can use to test your readiness to take the official TOGAF Business Architecture Foundation examination. The audience for this Study Guide is: Individuals, such as those responsible for business planning, who wish to apply the TOGAF Business Architecture approach in their working environment Individuals needing to gain competencies in TOGAF Business Architecture techniques Individuals who wish to become qualified as part of their own professional development A prior knowledge of Enterprise Architecture is advantageous but not required. Topics covered include: An introduction to TOGAF certification and the TOGAF Business Architecture Foundation qualification, including the TOGAF Business Architecture Foundation examination The concepts of Enterprise Architecture and the TOGAF Standard; this includes the TOGAF Architecture Development Method (ADM), the contents of the TOGAF framework, and the TOGAF Library The key terminology of TOGAF Business Architecture An introduction to the TOGAF ADM, including the objectives of the ADM phases, and how to adapt and scope the ADM for use How business modeling relates to the TOGAF Standard, the impact and benefits of business models, and examples of different representations of business models How to define business capabilities, how they can be modeled, and how to map them to other business perspectives Value streams and value stream mapping; the benefits, the different approaches to value stream analysis, the relationship to other Business Architecture concepts, and how to apply value streams How to apply information mapping when developing a Business Architecture How to apply organization mapping when developing a Business Architecture How to apply the TOGAF Business Scenario method How a Business Architecture is developed with the TOGAF ADM
Publisher: Van Haren
ISBN: 9401810133
Category : Architecture
Languages : en
Pages : 255
Book Description
The TOGAF® Standard, a standard of The Open Group, is a proven Enterprise Architecture methodology and framework used by the world’s leading organizations to improve business efficiency. The TOGAF Certification Program has enabled more than 100,000 Enterprise Architects and trainers around the globe to demonstrate their proven knowledge of the framework and method. This is the book you need to prepare for the TOGAF Business Architecture Foundation qualification. This edition is aligned to the TOGAF Standard, 10th Edition. It includes an overview of every learning outcome included in the TOGAF Business Architecture Syllabus and in-depth coverage on preparing and taking the TOGAF Business Architecture Foundation examination. It includes Key Learning Points, exercises and challenging Test Yourself questions for each part of the syllabus, together with a Test Yourself examination paper that you can use to test your readiness to take the official TOGAF Business Architecture Foundation examination. The audience for this Study Guide is: Individuals, such as those responsible for business planning, who wish to apply the TOGAF Business Architecture approach in their working environment Individuals needing to gain competencies in TOGAF Business Architecture techniques Individuals who wish to become qualified as part of their own professional development A prior knowledge of Enterprise Architecture is advantageous but not required. Topics covered include: An introduction to TOGAF certification and the TOGAF Business Architecture Foundation qualification, including the TOGAF Business Architecture Foundation examination The concepts of Enterprise Architecture and the TOGAF Standard; this includes the TOGAF Architecture Development Method (ADM), the contents of the TOGAF framework, and the TOGAF Library The key terminology of TOGAF Business Architecture An introduction to the TOGAF ADM, including the objectives of the ADM phases, and how to adapt and scope the ADM for use How business modeling relates to the TOGAF Standard, the impact and benefits of business models, and examples of different representations of business models How to define business capabilities, how they can be modeled, and how to map them to other business perspectives Value streams and value stream mapping; the benefits, the different approaches to value stream analysis, the relationship to other Business Architecture concepts, and how to apply value streams How to apply information mapping when developing a Business Architecture How to apply organization mapping when developing a Business Architecture How to apply the TOGAF Business Scenario method How a Business Architecture is developed with the TOGAF ADM
Information Governance
Author: Robert F. Smallwood
Publisher: John Wiley & Sons
ISBN: 111949141X
Category : Business & Economics
Languages : en
Pages : 548
Book Description
The essential guide to effective IG strategy and practice Information Governance is a highly practical and deeply informative handbook for the implementation of effective Information Governance (IG) procedures and strategies. A critical facet of any mid- to large-sized company, this “super-discipline” has expanded to cover the management and output of information across the entire organization; from email, social media, and cloud computing to electronic records and documents, the IG umbrella now covers nearly every aspect of your business. As more and more everyday business is conducted electronically, the need for robust internal management and compliance grows accordingly. This book offers big-picture guidance on effective IG, with particular emphasis on document and records management best practices. Step-by-step strategy development guidance is backed by expert insight and crucial advice from a leading authority in the field. This new second edition has been updated to align with the latest practices and regulations, providing an up-to-date understanding of critical IG concepts and practices. Explore the many controls and strategies under the IG umbrella Understand why a dedicated IG function is needed in today’s organizations Adopt accepted best practices that manage risk in the use of electronic documents and data Learn how IG and IT technologies are used to control, monitor, and enforce information access and security policy IG strategy must cover legal demands and external regulatory requirements as well as internal governance objectives; integrating such a broad spectrum of demands into workable policy requires a deep understanding of key concepts and technologies, as well as a clear familiarity with the most current iterations of various requirements. Information Governance distills the best of IG into a primer for effective action.
Publisher: John Wiley & Sons
ISBN: 111949141X
Category : Business & Economics
Languages : en
Pages : 548
Book Description
The essential guide to effective IG strategy and practice Information Governance is a highly practical and deeply informative handbook for the implementation of effective Information Governance (IG) procedures and strategies. A critical facet of any mid- to large-sized company, this “super-discipline” has expanded to cover the management and output of information across the entire organization; from email, social media, and cloud computing to electronic records and documents, the IG umbrella now covers nearly every aspect of your business. As more and more everyday business is conducted electronically, the need for robust internal management and compliance grows accordingly. This book offers big-picture guidance on effective IG, with particular emphasis on document and records management best practices. Step-by-step strategy development guidance is backed by expert insight and crucial advice from a leading authority in the field. This new second edition has been updated to align with the latest practices and regulations, providing an up-to-date understanding of critical IG concepts and practices. Explore the many controls and strategies under the IG umbrella Understand why a dedicated IG function is needed in today’s organizations Adopt accepted best practices that manage risk in the use of electronic documents and data Learn how IG and IT technologies are used to control, monitor, and enforce information access and security policy IG strategy must cover legal demands and external regulatory requirements as well as internal governance objectives; integrating such a broad spectrum of demands into workable policy requires a deep understanding of key concepts and technologies, as well as a clear familiarity with the most current iterations of various requirements. Information Governance distills the best of IG into a primer for effective action.
CISA certification guide
Author: Cybellium Ltd
Publisher: Cybellium Ltd
ISBN:
Category : Computers
Languages : en
Pages : 307
Book Description
Unlock Your Path to Success with the "CISA Certification Guide" In today's dynamic and ever-evolving world of information technology, securing critical business systems and data is paramount. Achieving the Certified Information Systems Auditor (CISA) certification is your ticket to becoming a recognized expert in information systems auditing, control, and assurance. "CISA Certification Guide" is your indispensable companion on the journey to mastering the CISA certification and advancing your career in the world of cybersecurity. Your Key to CISA Success The CISA certification is highly regarded in the field of information systems auditing and security, and it opens doors to exciting career opportunities. "CISA Certification Guide" provides you with a comprehensive and structured approach to preparing for the CISA exam, ensuring that you have the knowledge and confidence to succeed. What You Will Discover CISA Exam Domains: Gain a deep understanding of the five domains of the CISA exam, including auditing, governance, risk management, information systems acquisition, development, and implementation, information systems operations and business resilience, and protection of information assets. Key Concepts and Best Practices: Master essential concepts, principles, and best practices related to information systems audit, control, and assurance. Exam Preparation Strategies: Receive expert guidance on creating a personalized study plan, leveraging study resources, and maximizing your chances of passing the CISA exam. Real-World Scenarios: Learn through real-world scenarios, case studies, and practical examples that prepare you to tackle the challenges you'll encounter in your career. Practice Questions: Test your knowledge with practice questions and exercises designed to reinforce your understanding of CISA exam topics. Career Advancement: Discover how achieving the CISA certification can open doors to new career opportunities and increase your earning potential. Why "CISA Certification Guide" Is Essential Comprehensive Coverage: This book covers all the essential topics and exam domains, making it a one-stop resource for your CISA exam preparation. Expert Guidance: Benefit from the insights and expertise of seasoned CISA professionals who provide practical advice and exam-taking strategies. Career Advancement: The CISA certification is recognized globally and is a valuable credential for professionals looking to advance their careers in cybersecurity, auditing, and risk management. Stay Ahead: In a constantly changing cybersecurity landscape, the CISA certification demonstrates your commitment to staying updated and maintaining the highest standards of information systems auditing and control. Your Journey to CISA Certification Begins Here "CISA Certification Guide" is your roadmap to success on the CISA exam and in your career. Whether you are a seasoned IT professional or just beginning your journey in cybersecurity and audit, this book will equip you with the knowledge and skills needed to pass the CISA exam and excel in the field. "CISA Certification Guide" is the ultimate resource for individuals looking to achieve the Certified Information Systems Auditor (CISA) certification. Whether you are an experienced IT professional or just starting your cybersecurity journey, this book will provide you with the knowledge and strategies to pass the CISA exam and advance your career in information systems auditing and control. Don't wait; begin your journey to CISA certification success today! © 2023 Cybellium Ltd. All rights reserved. www.cybellium.com
Publisher: Cybellium Ltd
ISBN:
Category : Computers
Languages : en
Pages : 307
Book Description
Unlock Your Path to Success with the "CISA Certification Guide" In today's dynamic and ever-evolving world of information technology, securing critical business systems and data is paramount. Achieving the Certified Information Systems Auditor (CISA) certification is your ticket to becoming a recognized expert in information systems auditing, control, and assurance. "CISA Certification Guide" is your indispensable companion on the journey to mastering the CISA certification and advancing your career in the world of cybersecurity. Your Key to CISA Success The CISA certification is highly regarded in the field of information systems auditing and security, and it opens doors to exciting career opportunities. "CISA Certification Guide" provides you with a comprehensive and structured approach to preparing for the CISA exam, ensuring that you have the knowledge and confidence to succeed. What You Will Discover CISA Exam Domains: Gain a deep understanding of the five domains of the CISA exam, including auditing, governance, risk management, information systems acquisition, development, and implementation, information systems operations and business resilience, and protection of information assets. Key Concepts and Best Practices: Master essential concepts, principles, and best practices related to information systems audit, control, and assurance. Exam Preparation Strategies: Receive expert guidance on creating a personalized study plan, leveraging study resources, and maximizing your chances of passing the CISA exam. Real-World Scenarios: Learn through real-world scenarios, case studies, and practical examples that prepare you to tackle the challenges you'll encounter in your career. Practice Questions: Test your knowledge with practice questions and exercises designed to reinforce your understanding of CISA exam topics. Career Advancement: Discover how achieving the CISA certification can open doors to new career opportunities and increase your earning potential. Why "CISA Certification Guide" Is Essential Comprehensive Coverage: This book covers all the essential topics and exam domains, making it a one-stop resource for your CISA exam preparation. Expert Guidance: Benefit from the insights and expertise of seasoned CISA professionals who provide practical advice and exam-taking strategies. Career Advancement: The CISA certification is recognized globally and is a valuable credential for professionals looking to advance their careers in cybersecurity, auditing, and risk management. Stay Ahead: In a constantly changing cybersecurity landscape, the CISA certification demonstrates your commitment to staying updated and maintaining the highest standards of information systems auditing and control. Your Journey to CISA Certification Begins Here "CISA Certification Guide" is your roadmap to success on the CISA exam and in your career. Whether you are a seasoned IT professional or just beginning your journey in cybersecurity and audit, this book will equip you with the knowledge and skills needed to pass the CISA exam and excel in the field. "CISA Certification Guide" is the ultimate resource for individuals looking to achieve the Certified Information Systems Auditor (CISA) certification. Whether you are an experienced IT professional or just starting your cybersecurity journey, this book will provide you with the knowledge and strategies to pass the CISA exam and advance your career in information systems auditing and control. Don't wait; begin your journey to CISA certification success today! © 2023 Cybellium Ltd. All rights reserved. www.cybellium.com
ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS)
Author: Alan Calder
Publisher: IT Governance Publishing
ISBN: 1787783006
Category : Computers
Languages : en
Pages : 145
Book Description
ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS) walks you through the requirements of ISO 22301, explaining what they mean and how your organisation can achieve compliance. It is an essential companion guide for those working in business continuity.
Publisher: IT Governance Publishing
ISBN: 1787783006
Category : Computers
Languages : en
Pages : 145
Book Description
ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS) walks you through the requirements of ISO 22301, explaining what they mean and how your organisation can achieve compliance. It is an essential companion guide for those working in business continuity.
Cloud Governance
Author: Steven Mezzio
Publisher: Walter de Gruyter GmbH & Co KG
ISBN: 3110755378
Category : Business & Economics
Languages : en
Pages : 302
Book Description
Cloud computing is at the vanguard of the Metaverse-driven digital transformation. As a result, the cloud is ubiquitous; emerging as a mandate for organizations spanning size, sectors, and geographies. Cloud Governance: Basics and Practice brings to life the diverse range of opportunities and risks associated with governing the adoption and enterprise-wide use of the cloud. Corporate governance is uniquely disrupted by the cloud; exacerbating existing risks, and creating new and unexpected operational, cybersecurity, and regulatory risks. The cloud further extends the enterprise’s reliance on cloud service providers (CSPs), fueling an urgent need for agile and resilient business and IT strategies, governance, enterprise risk management (ERM), and new skills. This book discusses how the cloud is uniquely stressing corporate governance. Cloud Governance is a user-friendly practical reference guide with chapter-based self-assessment questions. The chapters in this book are interconnected and centered in a cloud governance ecosystem. This book will guide teachers, students and professionals as well as operational and risk managers, auditors, consultants and boards of directors.
Publisher: Walter de Gruyter GmbH & Co KG
ISBN: 3110755378
Category : Business & Economics
Languages : en
Pages : 302
Book Description
Cloud computing is at the vanguard of the Metaverse-driven digital transformation. As a result, the cloud is ubiquitous; emerging as a mandate for organizations spanning size, sectors, and geographies. Cloud Governance: Basics and Practice brings to life the diverse range of opportunities and risks associated with governing the adoption and enterprise-wide use of the cloud. Corporate governance is uniquely disrupted by the cloud; exacerbating existing risks, and creating new and unexpected operational, cybersecurity, and regulatory risks. The cloud further extends the enterprise’s reliance on cloud service providers (CSPs), fueling an urgent need for agile and resilient business and IT strategies, governance, enterprise risk management (ERM), and new skills. This book discusses how the cloud is uniquely stressing corporate governance. Cloud Governance is a user-friendly practical reference guide with chapter-based self-assessment questions. The chapters in this book are interconnected and centered in a cloud governance ecosystem. This book will guide teachers, students and professionals as well as operational and risk managers, auditors, consultants and boards of directors.
COBIT 5: Enabling Information
Author: ISACA
Publisher: ISACA
ISBN: 1604203498
Category : Technology & Engineering
Languages : en
Pages : 90
Book Description
Publisher: ISACA
ISBN: 1604203498
Category : Technology & Engineering
Languages : en
Pages : 90
Book Description
Strategic Approaches to Digital Platform Security Assurance
Author: Bobbert, Yuri
Publisher: IGI Global
ISBN: 1799873692
Category : Computers
Languages : en
Pages : 394
Book Description
Nowadays it is impossible to imagine a business without technology as most industries are becoming "smarter" and more tech-driven, ranging from small individual tech initiatives to complete business models with intertwined supply chains and "platform"-based business models. New ways of working, such as agile and DevOps, have been introduced, leading to new risks. These risks come in the form of new challenges for teams working together in a distributed manner, privacy concerns, human autonomy, and cybersecurity concerns. Technology is now integrated into the business discipline and is here to stay leading to the need for a thorough understanding of how to address these risks and all the potential problems that could arise. With the advent of organized crime, such as hacks and denial-of-service attacks, all kinds of malicious actors are infiltrating the digital society in new and unique ways. Systems with poor design, implementation, and configurations are easily taken advantage of. When it comes to integrating business and technology, there needs to be approaches for assuring security against risks that can threaten both businesses and their digital platforms. Strategic Approaches to Digital Platform Security Assurance offers comprehensive design science research approaches to extensively examine risks in digital platforms and offer pragmatic solutions to these concerns and challenges. This book addresses significant problems when transforming an organization embracing API-based platform models, the use of DevOps teams, and issues in technological architectures. Each section will examine the status quo for business technologies, the current challenges, and core success factors and approaches that have been used. This book is ideal for security analysts, software engineers, computer engineers, executives, managers, IT consultants, business professionals, researchers, academicians, and students who want to gain insight and deeper knowledge of security in digital platforms and gain insight into the most important success factors and approaches utilized by businesses.
Publisher: IGI Global
ISBN: 1799873692
Category : Computers
Languages : en
Pages : 394
Book Description
Nowadays it is impossible to imagine a business without technology as most industries are becoming "smarter" and more tech-driven, ranging from small individual tech initiatives to complete business models with intertwined supply chains and "platform"-based business models. New ways of working, such as agile and DevOps, have been introduced, leading to new risks. These risks come in the form of new challenges for teams working together in a distributed manner, privacy concerns, human autonomy, and cybersecurity concerns. Technology is now integrated into the business discipline and is here to stay leading to the need for a thorough understanding of how to address these risks and all the potential problems that could arise. With the advent of organized crime, such as hacks and denial-of-service attacks, all kinds of malicious actors are infiltrating the digital society in new and unique ways. Systems with poor design, implementation, and configurations are easily taken advantage of. When it comes to integrating business and technology, there needs to be approaches for assuring security against risks that can threaten both businesses and their digital platforms. Strategic Approaches to Digital Platform Security Assurance offers comprehensive design science research approaches to extensively examine risks in digital platforms and offer pragmatic solutions to these concerns and challenges. This book addresses significant problems when transforming an organization embracing API-based platform models, the use of DevOps teams, and issues in technological architectures. Each section will examine the status quo for business technologies, the current challenges, and core success factors and approaches that have been used. This book is ideal for security analysts, software engineers, computer engineers, executives, managers, IT consultants, business professionals, researchers, academicians, and students who want to gain insight and deeper knowledge of security in digital platforms and gain insight into the most important success factors and approaches utilized by businesses.