Information Security Governance

Train your operations, security, and IT managers on information security governance and the policies they need to include in ISG planning.

$ 9 USD

Train your operations, security, and IT managers on information security governance and the policies they need to include in ISG planning.

$ 49 USD

Learn about Network Infrastructure Security, how to install preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data.

$ 299 USD

Unlimited access to all courses, learning resources and collections with new content at no additional cost for a full year.

Courses: 
1
14
328
Lessons: 
5
60
1,417
Resources: 
Takeaway Tasks
Workbooks+
Multiple
Duration: 
10 minutes
175 minutes
Multiple
Access: 
30 days
60 days
12 months
Optimized for mobile

About

For any business, assets are important and need to be protected. But what do you think are a business’s most important assets? Maybe you think it’s the physical stock, or perhaps the building? Or is it the staff or customers? Nope, it’s the data.

The information an organization has is its biggest and richest asset. Because of that, data security breaches can have very serious consequences. So, every business needs to put measures and policies in place to safeguard their data. That’s what information security governance (ISG) is for.

What will you learn

This course is for business leaders and security, operations, or IT managers, who want to protect the business’s single most valuable asset: data. They’ll see how ISG goes further than just information security management and learn the best practices that they need to aim for. They’ll even get some useful advice on creating an information security governance policy.

  1. The differences between Information security management (ISM) and ISG
  2. The areas that need to be protected by ISG policies and what policies do you need to include in ISG planning
  3. How to recognize and adopt ISG best practices

Infrastructure Cybersecurity collection

For any business, assets are important and need to be protected. But what do you think are a business’s most important assets? Maybe you think it’s the physical stock, or perhaps the building? Or is it the staff or customers? Nope, it’s the data.

The information an organization has is its biggest and richest asset. Because of that, data security breaches can have very serious consequences. So, every business needs to put measures and policies in place to safeguard their data. That’s what information security governance (ISG) is for.

Other courses in this collection

Learn about Network Infrastructure Security, how to install preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data.

$ 9 USD

Train your operations, security, and IT managers on information security governance and the policies they need to include in ISG planning.

$ 49 USD

Learn about Network Infrastructure Security, how to install preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data.

$ 299 USD

Unlimited access to all courses, learning resources and collections with new content at no additional cost for a full year.

Courses: 
1
14
328
Lessons: 
5
60
1,417
Resources: 
Takeaway Tasks
Workbooks+
Multiple
Duration: 
10 minutes
175 minutes
Multiple
Access: 
30 days
60 days
12 months
Optimized for mobile