Information Security Governance
No. of mini-lessons5
No. of mini-lessons 5
Resources Takeaway Tasks
For any business, assets are important and need to be protected. But what do you think are a business’s most important assets? Maybe you think it’s the physical stock, or perhaps the building? Or is it the staff or customers? Nope, it’s the data.
The information an organization has is its biggest and richest asset. Because of that, data security breaches can have very serious consequences. So, every business needs to put measures and policies in place to safeguard their data. That’s what information security governance (ISG) is for.
The differences between Information security management (ISM) and ISG
The areas that need to be protected by ISG policies
What policies you need to include in ISG planning
How to recognize and adopt ISG best practices
Why your teams need this course
This course is for business leaders and security, operations, or IT managers, who want to protect the business’s single most valuable asset: data. They’ll see how ISG goes further than just information security management and learn the best practices that they need to aim for. They’ll even get some useful advice on creating an information security governance policy.
Other courses in this collection
The Power of a Strong Password
Strong passwords are essential for both work & personal tech. To keep your data safe, this course covers why and how to create a strong one.View course
The Danger of Viruses & Malware
Viruses and malware pose serious risks to a company. This course covers the dangers and how to prevent rogue agents from hijacking your data.View course