Course Hero Logo

Information assignment 2.docx - 1 Topic: Why Governance...

This preview shows page 1 - 4 out of 7 pages.

1Topic:Why GovernanceName:Hafiz Muhammad ShahrozCourse:CY501 Information Assurance and Security ManagementInstructor:Dr. Kanchan PantaDate:12/05/2021
Why Governance?2Governance enables you to act in the company's best interests at all times. Moreprecisely, it may boost your company's performance, help it become more stable and productive,and open up new doors. It has the potential to decrease hazards and enables faster and safergrowth. It can also help to boost one's reputation and develop trust. You've probably been doingcertain governance activities as a business owner since the beginning, whether you realize it ornot. Governance may be defined as 'oversight," supervision,'sure the wheels don't fall off.'Whatever you name it, it's critical for keeping your company on track (McCaw, 2018).Role of security governanceGovernance is an essential subject in cybersecurity because it explains the policies andprocesses that govern how businesses identify, prevent, and respond to cyber events. However,there is often a distinction between governance and management in many companies. Securitygovernance is a collection of tasks and activities carried out by senior management to givestrategic direction, ensure that objectives are met, ensure that risks are adequately managed, andensure that the enterprise's resources are utilized responsibly.The goal is to create "best-in-class" security through effective governance, which willensure:Roles and tasks are assigned.Risk evaluations and effect analyses are conducted regularly.Ownership of information assets is classified and assigned.Controls that are adequate, effective, and have been testedSecurity must be integrated into all organizational processes.Processes for monitoring security aspects are being implemented.Effective identity and access management for information users and suppliers
Why Governance?3Metrics that matterAll users, including management and board members, must be educated on informationsecurity needs.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 7 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
N/A
Tags
Management, information security governance

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture