Information Security Governance

Duration10'

No. of mini-lessons5

ResourcesTakeaway Tasks

Duration 10'

No. of mini-lessons 5

Resources Takeaway Tasks

Course overview

For any business, assets are important and need to be protected. But what do you think are a business’s most important assets? Maybe you think it’s the physical stock, or perhaps the building? Or is it the staff or customers? Nope, it’s the data. 

The information an organization has is its biggest and richest asset. Because of that, data security breaches can have very serious consequences. So, every business needs to put measures and policies in place to safeguard their data. That’s what information security governance (ISG) is for.

What's covered

The differences between Information security management (ISM) and ISG

The areas that need to be protected by ISG policies

What policies you need to include in ISG planning

How to recognize and adopt ISG best practices

information security governance online training course

Why your teams need this course

This course is for business leaders and security, operations, or IT managers, who want to protect the business’s single most valuable asset: data. They’ll see how ISG goes further than just information security management and learn the best practices that they need to aim for. They’ll even get some useful advice on creating an information security governance policy.

CPD Member

Accredited by CPD

TalentLibrary is recognized as reaching the standards and benchmarks required by the Continuing Professional Development (CPD) Certification Service.

The CPD Certification Service is the world’s leading and largest independent accreditation organization for professional development courses across all industry sectors.