Smallwood, R.F. (2019). Information governance (2nd ed.). Wiley. A reminder to complete the O’Reilly registration up to Step 5 where you get an email that will allow your browser to keep your password, solving future access limitations.
Read Chapter 5 – Strategic Planning and Best Practices for Information Governance.
This chapter discusses the process of developing a plan to strategically address information governance using best practices.
Moschovitis, C. (2018). Cybersecurity program development for business: the essential planning guide. Wiley Press. Read Chapter 4 – Management, Governance, and Alignment.
This chapter emphasizes the need for alignment between business goals and technology and cybersecurity initiatives within the organization.
Blum, D. (2020). Rational cybersecurity for business: The security leaders' guide to business alignment. Apress. Read Chapter 3 – Put the Right Security Governance Model in Place.
This chapter discusses recommendations for security leaders for addressing common challenges and understanding security governance functions.
Calder, A. (2020). Prepare for, respond to, and recover from cyber attacks. IT Governance Publishing. Read Chapter 15 – Govern and Assure.
This chapter discusses the process of validating your security efforts, making improvements as needed and possible, and ensuring that there are perpetual oversight and commitment on the part of board-level leadership.