Leaving the MOD and fancy a job in information security management?

20140717-085611

It has long been recognised that MOD personnel make excellent candidates for information security jobs when they leave the forces. With many years of training and practical experience in IT, signals, communications and intelligence, service leavers can expect to find a buoyant information security job market waiting for them. There is currently an unprecedented demand […]

Tech Partnership Training Fund – save £500 on the cost of UK cyber security training

TP logo

I am pleased to announce that IT Governance’s cyber security training courses now qualify for up to £500 of funding from the Tech Partnership Training Fund. This scheme provides direct grants to employers in order to stimulate increased investment in IT training that further promotes business growth and competitiveness in the UK. Supported by the […]

Why is CGEIT the elite IT governance qualification?

Presentation

Launched in 2007, the ISACA Certified in the Governance of Enterprise IT (CGEIT) certificate has become the premier qualification for those responsible for directing and managing the governance of IT in a large organisation. ISACA has confirmed that there are over 6,000 CGEIT professionals worldwide, with 77% holding senior positions as IT directors, audit directors, […]

Free guide to writing an information system audit report

Presentation

Auditing and the production of clear audit reports are crucial activities in ensuring the effective management of information systems. They are also mandatory requirements for the implementation of IT best practices and standards that include ITIL®, PRINCE2®, COBIT® 5, PCI DSS and ISO27001. ISACA® recently published Information Systems Auditing: Tools and Techniques, which provides a […]

Effective COBIT 5 implementation requires in-house training

COBIT-5-Courses-500

COBIT 5® published by ISACA, defines a comprehensive best-practice framework for the governance and management of enterprise IT. When correctly implemented, it allows the evaluation and control of information technology, so that it constantly contributes to both operational and business objectives. The COBIT 5 framework is generally used by larger organisations, and the successful implementation […]

Why aren’t all UK companies using privacy impact assessments?

Computer security

It has been a long year since the UK Information Commissioners Office (ICO) released its updated report, Conducting privacy impact assessments code of practice, in February 2014. Privacy impact assessments (PIAs) are at the heart of taking a ‘privacy by design’ approach and allow organisations to find and fix problems at an early stage, reducing […]

Why have CompTIA qualifications become so important?

businessman with laptop in network server room

Just like producing a fine wine, it can take a long time for an IT qualification to become recognised and valued by individuals and employers.  This is not a bad thing, as the IT industry has historically been littered with ‘print your own certificate’ schemes that are not worth the paper they are written on. […]

New CISSP exam due for 15 April 2015

(ISC)2 has announced a refresh of the CISSP Common Body of Knowledge (CBK) that will be effective from 15 April this year. Last updated in 2012, CISSP remains the gold standard qualification for developing a senior career in information security. The announced changes are part of the (ISC)2 commitment to ensure that the certification stays […]

What is CompTIA CASP and why is it important to your career?

iStock_000023125988Large

IT Governance Ltd has this week announced the launch of its new CompTIA Advanced Security Practitioner (CASP) training course. Designed to complement our Professional Certifications portfolio, the CASP course is a five-day classroom session that delivers the practical knowledge required to understand and implement effective information security controls in complex enterprise organisations. It also provides […]