Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • PM Modi in Manipur
  • Charlie Kirk killer
  • Sushila Karki
  • IND vs PAK
  • India-US ties
  • New human organ
  • Downton Abbey: The Grand Finale Movie Review
fp-logo
New COBIT 5 Guide Identifies Top Three Cyber Security Game Changers
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • Business
  • Biztech
  • New COBIT 5 Guide Identifies Top Three Cyber Security Game Changers

New COBIT 5 Guide Identifies Top Three Cyber Security Game Changers

FP Archives • February 3, 2017, 00:07:04 IST
Whatsapp Facebook Twitter

ISACA’s latest guide, Transforming Cybersecurity Using COBIT 5, examines the impact of these game changers and how to manage and transform security by using COBIT 5.

Advertisement
Subscribe Join Us
Add as a preferred source on Google
Prefer
Firstpost
On
Google
New COBIT 5 Guide Identifies Top Three Cyber Security Game Changers

Cybercrime is on the rise, but will grow even faster if organisations ignore an emerging group of cyber security game changers: always-on connectivity, an increasingly IT-centric society, and a new class system that separates people by technology skills. ISACA’s latest guide, Transforming Cybersecurity Using COBIT 5, examines the impact of these game changers and how to manage and transform security by using COBIT 5, a business framework for the governance and management of enterprise information and technology. Along with publication of the guide, IT association ISACA also announced the formation of a global cyber security task force.

STORY CONTINUES BELOW THIS AD

The three game changers named in the guide provide both motive and opportunity for cyber security breaches and criminal activities—especially the advanced persistent threat (APT) —if ignored:

More from Biztech
Future Group - Reliance Retail Deal approved by CCI Future Group - Reliance Retail Deal approved by CCI RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market
![](https://images.firstpost.com/wp-content/uploads/media/images/2013/Jun/img_124332_picture_450x360.jpg)

“In just the past three years, the number of threats and vulnerabilities has grown almost exponentially. By using COBIT 5, security professionals have a systematic approach for overcoming some of their biggest internal barriers—especially inadequate budget and lack of senior management support,” said Rolf von Roessing, CISA, CISM, CGEIT, CISSP, FBCI, Lead Developer of The Guide and President of FORFA AG.

This latest addition to ISACA’s cyber security series is designed for information security managers, corporate security managers, end users, service providers, IT administrators and IT auditors. It includes guidance on using the COBIT 5 framework to integrate cyber security with an overall approach to security governance, risk management and compliance, as well as eight principles for transforming security.

“The enormous opportunities inherent with cloud, mobility, social networking and Big Data also create significant security risks, and most organisations are ill-prepared to respond effectively. If we want to defend ourselves from sophisticated and targeted cyber attacks, it’s time to shift the industry’s thinking from a focus on compliance and perimeter security to a more proactive posture that is all about protecting the crown jewels,” said Eddie Schwartz, CISA, CISM, chair of ISACA’s Cybersecurity Task Force and Chief Information Security Officer (CISO) at RSA, The Security Division of EMC.

STORY CONTINUES BELOW THIS AD

A recent ISACA cybersecurity survey of more than 1,500 security professionals worldwide found that 94 percent of respondents believe that the APT represents a credible threat to national security and economic stability. Top risks were seen as loss of enterprise intellectual property (26 percent), loss of customer or employee personally identifiable information (24 percent) and damage to corporate reputation (21 percent).

ISACA Global Cyber security Task Force

As part of its ongoing commitment to helping business and IT leaders maximise value and manage risk related to information and technology, ISACA also announced the formation of a cyber security task force to drive research, guidance and advocacy. Eight information security professionals from locations around the world were named to the Cyber security Task Force:

  • Eddie Schwartz, CISO at RSA, The Security Division of EMC (USA) (chair)

  • Brent Conran, Chief Security Officer, McAfee (USA)

  • Marcus Sachs, Vice President for National Security Policy, Verizon (USA)

  • Neil Barlow, Head of Information Security Governance, Risk & Compliance (GRC), Euronext, NYSE (UK)

  • Samuel Linares, Director and Founder, Industrial Cyber security Center (Spain)

  • John Lyons, Chief Executive, International Cyber Security Protection Alliance (UK)

  • Manuel Aceves, Director General, Cerberian Consulting (Mexico)

  • Derek Grocke, Security & Infrastructure Manager, Internode (Australia)

“In recent past, global Cyber crime and related phenomena have grown exponentially with never-before-seen widespread losses and impact. The increasing number of targeted well-researched & sophisticated attacks on business and government entities is exposing their narrow and inconsistent approach to cyber security. ISACA’s latest Guide to Cyber security using COBIT 5 , identifies the key causative factors and provides a highly usable security governance roadmap that will help organisations in transforming their cyber security strategy and enable evolving an enterprise wide approach to security governance, risk management and compliance” said Vittal Raj, CISA, CISM, CGEIT,CRISC, CFE, CIA, CISSP, FCA and , International Vice President, ISACA.

“Formation of ISACA’s Global Cybersecurity Task Force is a step ahead to further educate the global security managers on the role of COBIT 5 and equip them better to tackle industry-wide cyber crime threats, ”said Avinash Kadam, CISA, CISM, CGEIT, CRISC, CISSP, CSSLP, GSEC, GCIH, CBCP, MBCI, PMP, CCSK, and Advisor to ISACA’s India Task Force.

STORY CONTINUES BELOW THIS AD
Tags
cyber security ISACA COBIT 5
End of Article
Written by FP Archives

see more

Latest News
Find us on YouTube
Subscribe
End of Article

Top Stories

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV