Securing an IT organization through governance, risk management, and audit. (2016)
- Record Type:
- Book
- Title:
- Securing an IT organization through governance, risk management, and audit. (2016)
- Main Title:
- Securing an IT organization through governance, risk management, and audit
- Further Information:
- Note: Ken E. Sigler, James L. Rainey.
- Authors:
- Sigler, Ken E
Rainey, James L - Contents:
- Cybersecurity Risk Management; Cybersecurity; Cybersecurity Risk Management; Managing ICT Security Risk through Governance, Control, and Audit; Implementing Best Practices Using a Single Cybersecurity Framework; Chapter Summary; Case Project; ; Introduction to the Framework for Improving Critical Infrastructure; Cybersecurity; Overview of the Framework; Framework Core; Framework Implementation Tiers; Framework Profile; Framework Is Descriptive and Not Prescriptive; Structure of the Book’s Presentation of the Framework; Chapter Summary; Case Project; ; Identify Function; Identify Function Overview; Asset Management Category; Business Environment Category; Governance Category; Risk Assessment Category; Risk Management Category; Risk Management Plan; Implementing Risk Management; Risk Handling Strategies; Linking COBIT to the Identify Function; Chapter Summary; Case Project; ; Protect Function; Protect Function Overview; Access Control Category; Awareness and Training Category; Data Security Category; Information Protection Processes and Procedures Category; Maintenance; Protective Technology; Linking COBIT to the Protect Function; Chapter Summary; Case Project; ; Detect Function; Detect Function Overview; Anomalies and Events Category; Security Continuous Monitoring Category; Detection Processes Category; Chapter Summary; Case Project; ; Respond Function; Respond Function Overview; Response Planning Category; Communications Category; Analysis Category; Mitigation Category;Cybersecurity Risk Management; Cybersecurity; Cybersecurity Risk Management; Managing ICT Security Risk through Governance, Control, and Audit; Implementing Best Practices Using a Single Cybersecurity Framework; Chapter Summary; Case Project; ; Introduction to the Framework for Improving Critical Infrastructure; Cybersecurity; Overview of the Framework; Framework Core; Framework Implementation Tiers; Framework Profile; Framework Is Descriptive and Not Prescriptive; Structure of the Book’s Presentation of the Framework; Chapter Summary; Case Project; ; Identify Function; Identify Function Overview; Asset Management Category; Business Environment Category; Governance Category; Risk Assessment Category; Risk Management Category; Risk Management Plan; Implementing Risk Management; Risk Handling Strategies; Linking COBIT to the Identify Function; Chapter Summary; Case Project; ; Protect Function; Protect Function Overview; Access Control Category; Awareness and Training Category; Data Security Category; Information Protection Processes and Procedures Category; Maintenance; Protective Technology; Linking COBIT to the Protect Function; Chapter Summary; Case Project; ; Detect Function; Detect Function Overview; Anomalies and Events Category; Security Continuous Monitoring Category; Detection Processes Category; Chapter Summary; Case Project; ; Respond Function; Respond Function Overview; Response Planning Category; Communications Category; Analysis Category; Mitigation Category; Improvement Category; Chapter Summary; Case Project; ; Recover Function; Distinguishing between Business Continuity and Disaster Recovery; Improvement Category; Communications Category; Chapter Summary; Case Project; ; The COBIT Framework; Assumptions; IT Governance; Framework Model; Practical Technical Scenarios (PTSs); What Drives COBIT 5; Framework Principles; Other Governance Frameworks and Best Practices; Case Project; ; Decomposition of Framework; Framework Principles: Creation; Definition of Categories and Seven Enablers; Control Issue; Navigation Issue; Case Project; ; Framework Structure’s Generic Domains; COBIT’s Framework Structure; Planning and Organization; Acquisition and Implementation; Delivery and Support; Monitoring; Case Project; ; Decomposition of COBIT 5; Purpose of COBIT Control Objectives and Principles; Principle 1: Installing the Integrated IT Architectural Framework; Principle 2: What Do Stakeholders Value?; Principle 3: The Business Context Focus; Principle 4: Managing Risk; Principle 5: Measuring Performance; Case Project; ; COBIT Management Guidelines; Enterprise Management; Risk Management; Status of IT Systems; Continuous Improvement; Case Project; ; COBIT Management Dashboard; Performance Measurement; IT Control Profiling; Awareness; Benchmarking; Case Project; ; What COBIT Sets Out to Accomplish; Adaptability to Existing Frameworks; Constituency of Governance for Finance; Constituency of Governance for IT; Case Project; ; Internal Audits; Purpose of Internal Audits; Roles That Potentially Use COBIT; Approaches to Using COBIT in an Internal Audit; Types of Audits Which Can Be Facilitated Using COBIT; Advantages of Using COBIT in Internal Audits; Case Project; ; Tying It All Together; COBIT Works with Sarbanes–Oxley (SOx); COBIT Works with GETIT; Process Assessment Model (PAM); Case Project; References; … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : Auerbach
- Publication Date:
- 2016
- Extent:
- 1 online resource, illustrations (black and white)
- Subjects:
- 658.478
Computer security
Information technology -- Auditing
Electronic data processing departments -- Auditing - Languages:
- English
- ISBNs:
- 9781498737326
- Related ISBNs:
- 9781498737319
- Notes:
- Note: Description based on CIP data; item not viewed.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.137946
- Ingest File:
- 02_042.xml