-
Lesson One: Information Security Governance Overview
00:00
-
Information Security Governance Overview Part One
00:00
-
Information Security Governance Overview Part Two
00:00
-
Information Security Governance Overview Part Three
00:00
-
Information Security Governance Overview Part Four
00:00
-
Information Security Governance Overview Part Five
00:00
-
Importance of Information Security Governance Part One
00:00
-
Importance of Information Security Governance Part Two
00:00
-
Outcomes of Information Security Governance Part one
00:00
-
Outcomes of Information Security Governance Part Two
00:00
-
Outcomes of Information Security Governance Part Three
00:00
-
Outcomes of Information Security Governance Part Four
00:00
-
Outcomes of Information Security Governance Part Five
00:00
-
Outcomes of Information Security Governance Part Six
00:00
-
Lesson Two: Effective Information Security Governance
00:00
-
Business Goals and Objectives Part One
00:00
-
Business Goals and Objectives Part Two
00:00
-
Roles and Responsibilities of Senior Management Part One
00:00
-
Roles and Responsibilities of Senior Management Part Two
00:00
-
Domain Tasks Part One
00:00
-
Domain Tasks Part Two
00:00
-
Business Model for Information Security Part One
00:00
-
Business Model for Information Security Part Two
00:00
-
Business Model for Information Security Part Three
00:00
-
Business Model for Information Security Part Four
00:00
-
Dynamic Interconnections Part One
00:00
-
Dynamic Interconnections Part Two
00:00
-
Dynamic Interconnections Part Three
00:00
-
Dynamic Interconnections Part Four
00:00
-
Lesson Three: Information Security Concepts and Technologies
00:00
-
Information Security Concepts and Technologies Part One
00:00
-
Information Security Concepts and Technologies Part Two
00:00
-
Information Security Concepts and Technologies Part Three
00:00
-
Technologies Part One
00:00
-
Technologies Part Two
00:00
-
Lesson Four: Information Security Manager
00:00
-
Responsibilities
00:00
-
Senior Management Commitment Part One
00:00
-
Senior Management Commitment Part Two
00:00
-
Obtaining Senior Management Commitment Part One
00:00
-
Obtaining Senior Management Commitment Part Two
00:00
-
Establishing Reporting and Communication Channels Part One
00:00
-
Establishing Reporting and Communication Channels Part Two
00:00
-
Lesson Five: Scope and Charter of Information Security Governance
00:00
-
Assurance Process Integration and Convergence
00:00
-
Convergence
00:00
-
Governance and Third-Party Relationships
00:00
-
Lesson Six: Information Security Governance Metrics
00:00
-
Metrics
00:00
-
Effective Security Metrics Part One
00:00
-
Effective Security Metrics Part Two
00:00
-
Effective Security Metrics Part Three
00:00
-
Effective Security Metrics Part Four
00:00
-
Security Implementation Metrics
00:00
-
Strategic Alignment Part One
00:00
-
Strategic Alignment Part Two
00:00
-
Risk Management
00:00
-
Value Delivery
00:00
-
Resource Management Part One
00:00
-
Resource Management Part Two
00:00
-
Performance Measurement
00:00
-
Assurance Process Integration/Convergence
00:00
-
Lesson Seven: Information Security Strategy Overview
00:00
-
Another View of Strategy
00:00
-
Lesson Eight: Creating Information Security Strategy
00:00
-
Information Security Strategy
00:00
-
Common Pitfalls Part One
00:00
-
Common Pitfalls Part Two
00:00
-
Objectives of the Information Security Strategy
00:00
-
What is the Goal?
00:00
-
Defining Objectives
00:00
-
Business Linkages
00:00
-
Business Case Development Part One
00:00
-
Business Case Development Part Two
00:00
-
Business Case Development Part Three
00:00
-
Business Case Objectives
00:00
-
The Desired State
00:00
-
COBIT
00:00
-
COBIT Controls
00:00
-
COBIT Framework
00:00
-
Capability Maturity Model
00:00
-
Balanced Scorecard
00:00
-
Architectural Approaches
00:00
-
ISO/IEC 27001 and 27002
00:00
-
Risk Objectives Part One
00:00
-
Risk Objectives Part Two
00:00
-
Lesson Nine: Determining Current State Of Security
00:00
-
Current Risk Part One
00:00
-
Current Risk Part Two
00:00
-
BIA
00:00
-
Lesson Ten: Information Security Strategy Development
00:00
-
The Roadmap
00:00
-
Elements of a Strategy
00:00
-
Strategy Resources and Constraints
00:00
-
Lesson Eleven: Strategy Resources
00:00
-
Policies and Standards
00:00
-
Definitions
00:00
-
Enterprise Information Security Architectures
00:00
-
Controls
00:00
-
Countermeasures
00:00
-
Technologies
00:00
-
Personnel
00:00
-
Organizational Structure
00:00
-
Employee Roles and Responsibilities
00:00
-
Skills
00:00
-
Audits
00:00
-
Compliance Enforcement
00:00
-
Threat Assessment
00:00
-
Vulnerability Assessment
00:00
-
Risk Assessment
00:00
-
Insurance
00:00
-
Business Impact Assessment
00:00
-
Outsourced Security Providers
00:00
-
Lesson twelve: Strategy Constraints
00:00
-
Legal and Regulatory Requirements
00:00
-
Physical Constraints
00:00
-
The Security Strategy
00:00
-
Lesson Thirteen: Action Plan to Implement Strategy
00:00
-
Gap Analysis Part One
00:00
-
Gap Analysis Part two
00:00
-
Gap Analysis Part Three
00:00
-
Policy Development Part One
00:00
-
Policy Development Part Two
00:00
-
Standards Development
00:00
-
Training and Awareness
00:00
-
Action Plan Metrics
00:00
-
General Metric Considerations Part One
00:00
-
General Metric Considerations Part Two
00:00
-
General Metric Considerations Part Three
00:00
-
General Metric Considerations Part Four
00:00
-
CMMFour Statements
00:00
-
Objectives for CMMFour
00:00
-
Section Review
00:00
-
Knowledge Check
00:00