Five best practices for information security governance

Diligent Boardbooks

Data is everywhere: on mobile devices, in the cloud, in transit. The accumulation of data and the rise of businesses using data to better hone their practices are rapidly evolving as data comes from various platforms and in different forms. Data growth, new technologies and evolving cyber-threats create challenges for organizations looking to set the strategies, framework and policies for keeping all of that information secure.

This white paper will provide best practices and guidelines by answering the following questions:

  • How is information security governance defined?
  • What are the misconceptions about information security governance?
  • Why is information security governance important?
  • Who is responsible for information security governance?


Please complete the form below with the information requested. Once you have filled in the form, you will be sent a link to the white paper to the email address you provide in the form.

We need this information so that we can make the study’s findings available to you, and so that we and Diligent can keep you updated via email and telephone of our products and services.

Neither Corporate Secretary nor Diligent will share this information with any third parties, and will only process it in accordance with our respective privacy policies, available here: Corporate Secretary privacy policy and Diligent privacy policy.


FAST TRACK DOWNLOADING REPORTS
Log in to your Corporate Secretary account to auto-complete the form below and save time!
Not got a Corporate Secretary account? Register free here to speed up downloading our reports >>

*Mandatory fields

We use cookies to make our website function properly and deliver our services. By using our website, you agree to our use of cookies, please click here to learn how to manage and delete cookies.