CSA 800 Information Security Governance


This course will discuss the requirements for information security governance. It will thoroughly discuss the required software, hardware, personnel, infrastructure and business processes to ensure that security is functionally able to help an organization in meeting strategic objectives.

Learning Outcomes:

  • Understand the essential components of a viable information security governance program.
  • Identify the important differences between corporate governance and IT governance, and learn when and how to apply each.
  • Assess regulatory requirements and their potential influence on business from an information security standpoint.