Information_Governance_Risk_Compliance_Frameworks (v5)

Grouping and listing of frameworks

INFORMATION GOVERNANCE-RISK-SECURITY-COMPLIANCE
GOVERNANCE
 COBIT - ISACA
 ITIL V3 - HM Government
 ISO-38500 - ISO
 CSF - HITRUST
 ITSM - HM Government
RISK MANAGEMENT
 COSO-ERM - Committee of Sponsoring Orgs
 ISO-31000/31010 – ISO
 ITAF – ISACA
GOVERNMENT
 FISMA - Fed Info Security Mgt Act
 FIPS – Fed Info Processing Stand (14)
 FIPS 200 - Min Security Requirements
 CIP 1-9 – NERC CIP-007 Sys Security Mgt.
 DIACAP - DoD In Ass Cert Accred. Proces
REGULATORY /COMPLIANCE
 GLBA – 8 Government Agencies
 BASE II - Basel Committee Banking Supervisn
 SOX 404 – SEC - Public Acct Oversight Board
 SAS 70 / SSAE16 - Auditing Standards Board
 PCI-DSS - PCI-SSC
 HIPAA - Health and Human Services (HHS)
 OMNIBUS RULE – HITECH
 SAFE HARBOR
 EU DIRECTIVE 95/46
 CBPR – Cross Border Privacy Rules (APEC)
 E-DISCOVERY
 FACTA-RED FLAGS
 CALIFORNIA SB 1386
QUALITY MANAGEMENT / SDLC
 CMMI - Carnegie-Mellon University
Capability Maturity Model Integration
 OGRCM3 - SOMAP
Open Governance, Risk and Compliance
Maturity Management Methodology
RISK ASSESSMENT METHODOLOGY
 COBRA - C&A Systems Security
Consultative, Objective Bi-functional Risk Analysis
 OCTAVE - CERT
Operationally Critical Threat, Asset, Vuln Eval
 CRAMM - CCTA
CCTA Risk Analysis and Management Method
 SPRINT - Information Security Forum
Simplified Process for Risk Identification
 SP800-30 - NIST
Guide to Conducting Risk Assessments
 ISSAF – OISSG
Information Sys Sec Assessment Framework
 IAM – NSA
INFOSEC Assessment Methodology
 ISAM – ISAM
Information-Sec Assessment Methodology
RISK ANALYSIS
 FAIR - The Open Group
Factor Analysis of information Risk
 FRAP - Carnegie-Mellon University
Facilitated Risk Analysis Process
VULNERABILITY / SECURITY ASSESSMENT
 OSSTM - ISECOM
Open Source Security Testing Methodology Manual
 Common Criteria - ISO/IEC 15408
STANDARDS GUIDELINES BEST PRACTICE
 ISO-27002 – ISO
 COMMON CRITERIA - App Sec Review
 OWASP – Top 10 & Cheat sheets
 NIST – ALL
 SP800-53 – NIST – Security Management
 CIS

Recommended

On The Front Lines Of Incident Respost by
On The Front Lines Of Incident RespostOn The Front Lines Of Incident Respost
On The Front Lines Of Incident RespostAlienVault
415 views1 slide
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever by
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverAlienVault
1.2K views19 slides
How Malware Works by
How Malware WorksHow Malware Works
How Malware WorksAlienVault
1.4K views17 slides
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover... by
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
1.1K views32 slides
The State of Incident Response - INFOGRAPHIC by
The State of Incident Response - INFOGRAPHICThe State of Incident Response - INFOGRAPHIC
The State of Incident Response - INFOGRAPHICAlienVault
3.4K views1 slide

More Related Content

Viewers also liked

The Challenging and Changing Face of NHS Information Governance - Paper Deliv... by
The Challenging and Changing Face of NHS Information Governance - Paper Deliv...The Challenging and Changing Face of NHS Information Governance - Paper Deliv...
The Challenging and Changing Face of NHS Information Governance - Paper Deliv...Andrew Harvey BA (Hons), MA, CISMP
342 views24 slides
Governance Risk and Compliance for SAP by
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAPPECB
1.4K views25 slides
Information Governance -- Necessary Evil or a Bridge to the Future? by
Information Governance -- Necessary Evil or a Bridge to the Future?Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?John Mancini
6.5K views46 slides
Mike2.0 Information Governance Overview by
Mike2.0 Information Governance OverviewMike2.0 Information Governance Overview
Mike2.0 Information Governance Overviewsean.mcclowry
12.5K views53 slides
De dienstgeoriënteerde cmdb - SEE 2016 by
De dienstgeoriënteerde cmdb - SEE 2016De dienstgeoriënteerde cmdb - SEE 2016
De dienstgeoriënteerde cmdb - SEE 2016TOPdesk
1.2K views22 slides
Webinar: Information Governance - Where is the Healthcare Industry and Where ... by
Webinar: Information Governance - Where is the Healthcare Industry and Where ...Webinar: Information Governance - Where is the Healthcare Industry and Where ...
Webinar: Information Governance - Where is the Healthcare Industry and Where ...Modern Healthcare
2.4K views31 slides

Viewers also liked(9)

Governance Risk and Compliance for SAP by PECB
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
PECB 1.4K views
Information Governance -- Necessary Evil or a Bridge to the Future? by John Mancini
Information Governance -- Necessary Evil or a Bridge to the Future?Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?
John Mancini6.5K views
Mike2.0 Information Governance Overview by sean.mcclowry
Mike2.0 Information Governance OverviewMike2.0 Information Governance Overview
Mike2.0 Information Governance Overview
sean.mcclowry12.5K views
De dienstgeoriënteerde cmdb - SEE 2016 by TOPdesk
De dienstgeoriënteerde cmdb - SEE 2016De dienstgeoriënteerde cmdb - SEE 2016
De dienstgeoriënteerde cmdb - SEE 2016
TOPdesk1.2K views
Webinar: Information Governance - Where is the Healthcare Industry and Where ... by Modern Healthcare
Webinar: Information Governance - Where is the Healthcare Industry and Where ...Webinar: Information Governance - Where is the Healthcare Industry and Where ...
Webinar: Information Governance - Where is the Healthcare Industry and Where ...
Modern Healthcare2.4K views

Similar to Information_Governance_Risk_Compliance_Frameworks (v5)

DSS RMF Training.pptx by
DSS RMF Training.pptxDSS RMF Training.pptx
DSS RMF Training.pptxMuhammad Mazhar
57 views39 slides
S nandakumar by
S nandakumarS nandakumar
S nandakumarIPPAI
208 views31 slides
S nandakumar_banglore by
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
813 views31 slides
David W. Graham, CEO, Energy Technology Risk Advisors, LLC by
David W. Graham, CEO, Energy Technology Risk Advisors, LLCDavid W. Graham, CEO, Energy Technology Risk Advisors, LLC
David W. Graham, CEO, Energy Technology Risk Advisors, LLCDavid W. Graham
150 views1 slide
RiskWatch for Physical & Homeland Security™ by
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™CPaschal
1.1K views44 slides
Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016 by
Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016
Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
293 views19 slides

Similar to Information_Governance_Risk_Compliance_Frameworks (v5)(20)

S nandakumar by IPPAI
S nandakumarS nandakumar
S nandakumar
IPPAI208 views
S nandakumar_banglore by IPPAI
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
IPPAI813 views
David W. Graham, CEO, Energy Technology Risk Advisors, LLC by David W. Graham
David W. Graham, CEO, Energy Technology Risk Advisors, LLCDavid W. Graham, CEO, Energy Technology Risk Advisors, LLC
David W. Graham, CEO, Energy Technology Risk Advisors, LLC
David W. Graham150 views
RiskWatch for Physical & Homeland Security™ by CPaschal
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
CPaschal1.1K views
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter by Phil Agcaoili
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
Phil Agcaoili1.6K views
The IT Analysis Paralysis by PYA, P.C.
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis
PYA, P.C.391 views
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa... by James W. De Rienzo
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
James W. De Rienzo2.6K views
Trust Service Providers: Self-Regulatory Processes by CASCouncil
Trust Service Providers: Self-Regulatory ProcessesTrust Service Providers: Self-Regulatory Processes
Trust Service Providers: Self-Regulatory Processes
CASCouncil414 views
Senior Independent IT Auditor (GRC), CISSP & CISA_April 28th, 2015 by Pw Carey
Senior Independent IT Auditor (GRC), CISSP & CISA_April 28th, 2015Senior Independent IT Auditor (GRC), CISSP & CISA_April 28th, 2015
Senior Independent IT Auditor (GRC), CISSP & CISA_April 28th, 2015
Pw Carey359 views
Information Security Management System ISO/IEC 27001:2005 by ControlCase
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
ControlCase30.5K views

More from Jason Rusch - CISSP CGEIT CISM CISA GNSA

Cobit v5 High Level Controls Topology by
Cobit v5 High Level Controls TopologyCobit v5 High Level Controls Topology
Cobit v5 High Level Controls TopologyJason Rusch - CISSP CGEIT CISM CISA GNSA
38 views1 slide
Cobit & ISO 27002 Governance Topology by
Cobit & ISO 27002 Governance TopologyCobit & ISO 27002 Governance Topology
Cobit & ISO 27002 Governance TopologyJason Rusch - CISSP CGEIT CISM CISA GNSA
95 views1 slide

More from Jason Rusch - CISSP CGEIT CISM CISA GNSA(20)

Recently uploaded

SUDIP DHAR Resume.pdf by
SUDIP DHAR  Resume.pdfSUDIP DHAR  Resume.pdf
SUDIP DHAR Resume.pdfSudip Dhar
13 views2 slides
Readiness Quiz - Sr. Engineer.pptx by
Readiness Quiz - Sr. Engineer.pptxReadiness Quiz - Sr. Engineer.pptx
Readiness Quiz - Sr. Engineer.pptxguptanavneet1
445 views7 slides
WordCamp (Why fret over AI overlords when you can befriend them).pdf by
WordCamp (Why fret over AI overlords when you can befriend them).pdfWordCamp (Why fret over AI overlords when you can befriend them).pdf
WordCamp (Why fret over AI overlords when you can befriend them).pdfBiaAhmed1
25 views14 slides
IIBA Adelaide Lean Coffee - FOBA & other Acronyms by
IIBA Adelaide Lean Coffee - FOBA & other AcronymsIIBA Adelaide Lean Coffee - FOBA & other Acronyms
IIBA Adelaide Lean Coffee - FOBA & other AcronymsAustraliaChapterIIBA
19 views11 slides
Public Speaking by
Public SpeakingPublic Speaking
Public SpeakingBasel Ahmed
50 views11 slides
Software Engineer's Career Management Toolkit by
Software Engineer's Career Management ToolkitSoftware Engineer's Career Management Toolkit
Software Engineer's Career Management Toolkitozgengungor1
18 views41 slides

Recently uploaded(13)

SUDIP DHAR Resume.pdf by Sudip Dhar
SUDIP DHAR  Resume.pdfSUDIP DHAR  Resume.pdf
SUDIP DHAR Resume.pdf
Sudip Dhar13 views
Readiness Quiz - Sr. Engineer.pptx by guptanavneet1
Readiness Quiz - Sr. Engineer.pptxReadiness Quiz - Sr. Engineer.pptx
Readiness Quiz - Sr. Engineer.pptx
guptanavneet1445 views
WordCamp (Why fret over AI overlords when you can befriend them).pdf by BiaAhmed1
WordCamp (Why fret over AI overlords when you can befriend them).pdfWordCamp (Why fret over AI overlords when you can befriend them).pdf
WordCamp (Why fret over AI overlords when you can befriend them).pdf
BiaAhmed125 views
Software Engineer's Career Management Toolkit by ozgengungor1
Software Engineer's Career Management ToolkitSoftware Engineer's Career Management Toolkit
Software Engineer's Career Management Toolkit
ozgengungor118 views
113. BP International by Manu Mitra
113. BP International113. BP International
113. BP International
Manu Mitra5 views
Danny Gaethofs CV - n English.pdf by Danny Gaethofs
Danny Gaethofs  CV - n English.pdfDanny Gaethofs  CV - n English.pdf
Danny Gaethofs CV - n English.pdf
Danny Gaethofs13 views
Resume_McCauleyFynnBullock-1 (1).pdf by FynnBullock
Resume_McCauleyFynnBullock-1 (1).pdfResume_McCauleyFynnBullock-1 (1).pdf
Resume_McCauleyFynnBullock-1 (1).pdf
FynnBullock16 views
Readiness Quiz - Staff Engineer.pptx by guptanavneet1
Readiness Quiz - Staff Engineer.pptxReadiness Quiz - Staff Engineer.pptx
Readiness Quiz - Staff Engineer.pptx
guptanavneet1623 views

Information_Governance_Risk_Compliance_Frameworks (v5)

  • 1. INFORMATION GOVERNANCE-RISK-SECURITY-COMPLIANCE GOVERNANCE  COBIT - ISACA  ITIL V3 - HM Government  ISO-38500 - ISO  CSF - HITRUST  ITSM - HM Government RISK MANAGEMENT  COSO-ERM - Committee of Sponsoring Orgs  ISO-31000/31010 – ISO  ITAF – ISACA GOVERNMENT  FISMA - Fed Info Security Mgt Act  FIPS – Fed Info Processing Stand (14)  FIPS 200 - Min Security Requirements  CIP 1-9 – NERC CIP-007 Sys Security Mgt.  DIACAP - DoD In Ass Cert Accred. Proces REGULATORY /COMPLIANCE  GLBA – 8 Government Agencies  BASE II - Basel Committee Banking Supervisn  SOX 404 – SEC - Public Acct Oversight Board  SAS 70 / SSAE16 - Auditing Standards Board  PCI-DSS - PCI-SSC  HIPAA - Health and Human Services (HHS)  OMNIBUS RULE – HITECH  SAFE HARBOR  EU DIRECTIVE 95/46  CBPR – Cross Border Privacy Rules (APEC)  E-DISCOVERY  FACTA-RED FLAGS  CALIFORNIA SB 1386 QUALITY MANAGEMENT / SDLC  CMMI - Carnegie-Mellon University Capability Maturity Model Integration  OGRCM3 - SOMAP Open Governance, Risk and Compliance Maturity Management Methodology RISK ASSESSMENT METHODOLOGY  COBRA - C&A Systems Security Consultative, Objective Bi-functional Risk Analysis  OCTAVE - CERT Operationally Critical Threat, Asset, Vuln Eval  CRAMM - CCTA CCTA Risk Analysis and Management Method  SPRINT - Information Security Forum Simplified Process for Risk Identification  SP800-30 - NIST Guide to Conducting Risk Assessments  ISSAF – OISSG Information Sys Sec Assessment Framework  IAM – NSA INFOSEC Assessment Methodology  ISAM – ISAM Information-Sec Assessment Methodology RISK ANALYSIS  FAIR - The Open Group Factor Analysis of information Risk  FRAP - Carnegie-Mellon University Facilitated Risk Analysis Process VULNERABILITY / SECURITY ASSESSMENT  OSSTM - ISECOM Open Source Security Testing Methodology Manual  Common Criteria - ISO/IEC 15408 STANDARDS GUIDELINES BEST PRACTICE  ISO-27002 – ISO  COMMON CRITERIA - App Sec Review  OWASP – Top 10 & Cheat sheets  NIST – ALL  SP800-53 – NIST – Security Management  CIS