From the course: ISACA Certified Information Systems Auditor (CISA) Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Information security program
From the course: ISACA Certified Information Systems Auditor (CISA) Cert Prep
Information security program
- [Kelly] Let's go ahead and take a look at the Information Security Program. So as I mentioned in the last section, you know, we talked about this is where the rubber meets the road. This is where we have this concept of strategy, but we're going to implement it and we're going to enforce it and we are going to bring it to life, so to speak. So this is how we achieve strategy, and it's going to consist of our policies, our procedures and standards, guidelines, third-party governance. This is where we look at classification of data, which we've talked about, certification and accreditation. And look, there's that magic word at the end, auditing. So when we start off with our policy, policy is going to voice management's expectations, maybe for the organization as a whole, or maybe in relation to specific issues, or maybe in relation to specific systems, right? But that's the purpose of policy. So when we look at policies, there are all sorts of policies that could be implemented. I've…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
(Locked)
Enterprise risk management8m 30s
-
(Locked)
Introduction to IT governance8m 46s
-
(Locked)
IT frameworks9m 20s
-
(Locked)
Frameworks continued11m 38s
-
(Locked)
Enterprise architecture4m 55s
-
(Locked)
Evaluation of controls3m 36s
-
(Locked)
Evaluation criteria8m 11s
-
(Locked)
Information security strategy8m 9s
-
(Locked)
Information security program6m 44s
-
(Locked)
Quality control and security management3m 40s
-
(Locked)
Roles and responsibilities7m 7s
-
(Locked)
-
-
-