Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
COBIT
Control Objectives for Information and related Technology (or COBIT) is a framework of guidelines and best practices for IT Managers to achieve corporate governance and compliance. The framework was created jointly by the Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI). The adoption of the COBIT model of creating a compliant IT framework is recognised as one of the most controlled methods of achieving governance.
Guide available for Sarbanes-Oxley IT control objectives
ISACA is providing its membership with a free guide to enable them to understand the IT control objectives of the Sarbanes-Oxley regulations
Preparations for increase in IT security complexity in 2014
ISACA releases its views of the changing world of IT security during 2014 with its list of five New Year resolutions
Free ISACA white paper examines Security as a Service
IT security industry body releases white paper detailing which questions should be posed before considering the deployment of cloud based security as a service
Information Governance in big data environments
The move towards complexity in data storage and compliance needs are demanding greater focus on information governance
Book on APTs provides protection advice
ISACA has published a book on Advanced Persistent Threats: How to manage risk to your business, detailing how modern defences are required against such threats
IS Audit and Assurance Guideline feedback sought
ISACA is soliciting feedback on updates it has made to its set of IS audit and assurance guideline drafts
Assessment programme examines business goals
ISACA is equipping IT professionals with tools to match IT requirements to general business goals with the COBIT 5 Assessment programme
New job demands catered for in IT security qualification
ISACA has performed job analysis to modify CGEIT certificate to reflect changes in the roles of IT security professional
ISACA identifies key IT trends of 2013
Looking to the year ahead, ISACA identifies certain aspects of IT security that will have the greatest impact on organizations
Training partnership for COBIT 5
ISACA enters partnership for providing training to IT security professionals in the COBIT 5 framework for government and enterprise IT management
IT security audit materials available from ISACA
IT professional body releases additional security audit plans in its range for security personnel to use for cybercrime, biometric, e-commerce and VPN security audits
ISACA Speculates On the Next Trend Beyond BYOD
Christos Dimitriadis of ISACA looks into the background of BYOD (Bring Your Own Device) and uses it to foretell the future of network security and predict what will BYOD V2 be
ISACA Changes Rules On CGEIT Certification
After the end of this year, Governance of Enterprise IT certification from ISACA will no longer be based on current job practice
The Role of Governance in Identity and Access Management
Mike Small of ISACA explains the approach of good governance in its role as a binding factor in controlling access and managing identity
Cloud Computing And The Dangers Of A Slothful Approach
Being sluggish in comprehending the cloud computing environment that a business is adopting can lead to problems as explained by Mike Small of ISACA
Information Security Governance Explored in Munich Conference
ISACA is hosting a conference in Munich examining Information security governance and risk management in September
Partnership Results In New COBIT 5 Courses
ISACA is launching four new courses in COBIT 5 for Enterprise IT and Governance alongside APMG for IT Security professionals
Three Key Lessons of IT Risk Management
Brian Barnier of ISACA details three key lessons for the prevention of IT security incidents in the enterprise
ISACA Comments On Inclusion of Software Testing in Governance
Information Security Professional Organisation considers the inclusion of software testing under the umbrella of security governance to be a move in the correct direction
Combined EuroCACS and ISRM Conference in Munich
ISACA is combining the EuroCACS and ISRM conferences in one event this year to take place in September in the German city of Munich
ISACA Explains Enterprise Log Management
Experts from ISACA introduce the concept of Enterprise Log Management and how it is used
AET Protection Expertise From ISACA
IT Security professional industry body provides information on protection against Advanced Evasion Techniques
VDI Guidance Available From ISACA
IT Security professional certification body issues free guidance on virtualized desktop infrastructure
Growth In IT Security Professional Certification
ISACA has noted the increase in IT professionals seeking security certification with the 5000th CGEIT certificate awarded
Enterprise IT Governance Framework
ISACA Chapter Created In Venice
Support will be provided for information security professionals in Italy through the new chapter of ISACA formed in the city of Venice
Audit and Assurance Programs For Risk Managers
ISACA has developed a range of services covering auditing and assurance to provide assistance to IT assurance professionals
Information Security Standard of Good Practice
The 2011 Standard of Good Practice released by the Information Security Forum provides clear guidance to businesses on IT security
Whitepaper Examines Smartphone Geolocation Risks
In its white paper Geolocation Risk, Issues and Strategies, ISACA offers smartphone users a five step plan to avoiding risks associated with the use of geolocation applications
Security Considerations On Adopting Cloud Computing
The ISACA Security Advisory Group explains how risk management should be applied when adopting a cloud computing strategy
ISACA Risk/Reward Barometer Examines UK Industry Views On IT Risk
Key conclusions reached by ISACA include high risk factor of employee-owned mobile devices and a continued high level of concern over cloud computing security
Version 2.0 Released Of LogLogic Compliance Manager
Multiple compliance regulations and active directory support for remote user authentication among the enhancements released in version 2.0 of LogLogic's Compliance Manager
White Paper Details Increased Mobile Phone Data Leakage Threat
The threat of loss of confidential corporate data is increasing due to the increased usage of mobile devices for business purposes according to a new white paper released by ISACA
King III Compliance Assistance Available for South African companiestest
The IT Governance Framework Toolkit is now available in South Africa for providing support in achieving King III compliance for corporate governance
Affordable File Transfer System For Prevention of Data Losses
Sending large or sensitive files has become easier and safer with the use of Sendable from Ipswitch which enables the secure transfer of files without the use of cumbersome e-mail attachments of physical media
Risk and Log Management Integration with Security Incident Response
QRadar Risk Management from Q1 Labs provides automated risk management and vulnerability assessment capabilities
Data Centre Planning Puts Security As Highest Priority
For IT Managers planning their data centre activity, ISACA has free resources available for its members to assist in establishing Risk IT Frameworks and also putting together a Business Model for IT Security
Award Shortlist for Risk and Compliance Management Software
Citicus ONE has been shortlisted by SC Magazine for the best security management product for providing information risk management for major commercial banking clients
Conference from ISACA provides IT security insight in four streams
IT Governance, IT Audit and Assurance, Information Security Management and Compliance and Risk Management are all covered in the EuroCACS conference organised by ISACA taking place in Budapest in March
Security Manual Template for 2010 details IT security procedures
A manual has been made available for IT security professionals for 2010 from Research and Markets providing templates for putting in place a robust security policy
Risk IT risk management framework available from ISACA
ISACA has made it's IT related risk framework available as a free download
Seasonal discounts available on IT Security courses
Courses on IT Security subjects including ISO 27001 auditing and digital forensics are available in January with early booking discounts of 30%
DB3 created for marketing HiSolutions GRC software
HiSolutions' Governance, Risk and Compliance suite will be marketed in Europe under the DB3 spin-off company
New Board Line Up at ISACA
International President announced for IT Governance and IT Security professional organisation ISACA
Lumension joins unified compliance framework
Network Frontiers and Lumension join forces to create global compliance database
ISACA applauds e-Security awareness week in Australia
IT Security best practice organisation praises the stance taken by Australia with "change your password" day and e-Security awareness week, believing other countries should follow suit.
Acuity users gain benefit from ISF agreement
Users of compliance management software from Acuity now have real-time access to the ISF standard of good practice
COBIT Governance Guide
Free guide to effective IT Governance available to members of the IT Governance Institute
ISACA conference to cover new risk framework
Risk IT Framework issued by the IT Governance Institute to form the basis of discussions to be held at the forthcoming ISACA Conference
Automated Risk and Compliance Management
Gidi Cohen of Skybox Security examine IT Risk and Compliance Management and how it can be managed in a more automated fashion
First | Prev  | 1 | 2  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo