article thumbnail

Information Governance – 3 Common Pitfalls and How to Avoid Them

AIIM

What is Information Governance, and Why is it Important? There are many benefits to constructing an Information Governance program plan. How to Avoid Information Governance Pitfalls. How to Avoid Information Governance Pitfalls. We'll also cover some strategies to avoid them.

article thumbnail

How to Manage Your Cyber Risks

IT Governance

This process should be embedded within your overall cyber security measures in what experts refer to as cyber defence in depth. The framework consists of five interrelated stages (or ‘layers’) to help organisations manage information security risks across all parts of their business. How we can help.

Risk 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to document your information security policy

IT Governance

We have collated some information from Alan Calder’s Nine Steps to Success: An ISO 27001 Implementation Overview and IT Governance: An international guide to data security and ISO 27001/ISO 27002 to help you produce your own information security policy. First, what is an information security policy?

article thumbnail

How to Dominate the Domains of the NEW CIP - D4: Automating Governance and Compliance

AIIM

Welcome back to this continuing series on the updated Certified Information Professional (CIP) exam. In this post, I'll be focusing on Domain 4, Automating Governance and Compliance. Domain 4: Automating Governance and Compliance. But this strategy still needs to align to and support the overall business strategy.

article thumbnail

How to Integrate ISO 9001 with ISO 27001

IT Governance

Organisations have spent the past few years rushing to address mounting information security risks, from the rising threat of cyber attacks to the possibility of sizeable fines under the GDPR (General Data Protection Regulation). If your organisation is ready to adopt ISO 9001 and ISO 27001, IT Governance is here to help.

article thumbnail

Information Governance Pressure Points – 3 Common Areas of Failure

AIIM

Back in the day, when work was centralized in locations and on devices “within” the enterprise, it was reasonable to assume that control could most effectively be maintained by managing security at the firewall. Information security was largely a function of “keeping the bad guys out.”. Information “end points”.

article thumbnail

How to Protect Your Organisation from a Cyber Attack

IT Governance

Organisations should prepare for these attacks by implementing robust cyber security controls and ensuring that employees know how to manage cyber security controls. Cyber Essentials is a UK government-backed framework supported by the NCSC (National Cyber Security Centre). How we can help.