article thumbnail

Meet the shady companies helping governments hack citizens’ phones via Fast Company

IG Guru

The post Meet the shady companies helping governments hack citizens’ phones via Fast Company first appeared on IG GURU. Check out the article here.

article thumbnail

What Is Information Security Management?

IT Governance

Information security management is a way of protecting an organisation’s sensitive data from threats and vulnerabilities. The process is typically embedded via an ISMS (information security management system) , which provides the framework for managing information security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

The benefits of partnering with us, and our partner-exclusive event IT Governance launched its partner programme in 2017, which now includes more than 400 organisations. And why should organisations consider partnering with IT Governance? What is it that makes IT Governance special? What else can partners expect from the event?

article thumbnail

GDPR compliance and information security: reducing data breach risks

IT Governance

Yes, most information security experts will be able to explain what confidentiality, integrity and availability mean, but other terms, like ‘risk’, are surprisingly vague. Equally importantly, the GDPR doesn’t provide guidance on how organisations should meet their requirements. So, what should you do instead? ISMS initiation.

article thumbnail

Kick-start your career in information security management

IT Governance

If you’re looking to develop a career in information security, the CISMP training course is a great starting point. It provides a broad introduction to information security management upon which more technical qualifications can be built. You can read the BCS CISMP syllabus here.

article thumbnail

When Email Security Meets SaaS Security: Uncovering Risky Auto-Forwarding Rules via The Hacker News

IG Guru

The post When Email Security Meets SaaS Security: Uncovering Risky Auto-Forwarding Rules via The Hacker News first appeared on IG GURU. Check out the article here.

article thumbnail

How to document your information security policy

IT Governance

We have collated some information from Alan Calder’s Nine Steps to Success: An ISO 27001 Implementation Overview and IT Governance: An international guide to data security and ISO 27001/ISO 27002 to help you produce your own information security policy. First, what is an information security policy?