{"id":57,"date":"2007-08-20T21:55:00","date_gmt":"2007-08-20T21:55:00","guid":{"rendered":"http:\/\/mayanktrivedi.net\/technotes\/2007\/08\/20\/information-security-and-governing-structures\/"},"modified":"2022-04-06T20:23:49","modified_gmt":"2022-04-06T20:23:49","slug":"information-security-and-governing-structures","status":"publish","type":"post","link":"http:\/\/mayanktrivedi.net\/technotes\/2007\/08\/20\/information-security-and-governing-structures\/","title":{"rendered":"Information Security and Governing Structures"},"content":{"rendered":"<div>\n<p><span style='font-size: 10.0pt;font-family:Arial;color:navy'>Information Security today is Governed by Regulations, Standards, Guidelines and Industry Best Practices.&nbsp; They provide for frameworks, methodologies and approaches to attain Information Security baselines. Compliance to any of them is just meeting these baselines, but there is more to be done over and above the compliance.&nbsp; Compliance achievement is something that holds importance with the industry, but more is to the Management of Sustenance with increased maturity of the Information Security Program and the overall Information Security Posture.&nbsp; Any Security Program aimed at Compliance does not reflect in the organizational effectiveness as the program that is driven by the Top Management and that precipitates to the Grass Root Level.<o:p><\/o:p><\/span><\/p>\n<p><span style='font-size: 10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;<\/o:p><\/span><\/p>\n<p><span style='font-size: 10.0pt;font-family:Arial;color:navy'>An efficient Information Security Program brings in paradigm shift in organizational work culture, infusing the Business Process Reengineering to imbibe Security Practice as the Core of Business Operations.<o:p><\/o:p><\/span><\/p>\n<p><span lang=EN-IN style='font-size: 10.0pt;font-family:Arial'><o:p>&nbsp;<\/o:p><\/span><\/p>\n<p><span lang=EN-IN style='font-size: 10.0pt;font-family:Arial'><o:p>&nbsp;<\/o:p><\/span><\/p>\n<p><st1:PersonName w:st=\"on\"><strong><b><span lang=EN-IN style='font-size:18.0pt;  font-family:\"Monotype Corsiva\";color:maroon'>Mayank Trivedi<\/span><\/b><\/strong><\/st1:PersonName><span lang=EN-IN style='font-family:Arial'><o:p><\/o:p><\/span><\/p>\n<p><span lang=EN-IN style='font-size:10.0pt'><o:p>&nbsp;<\/o:p><\/span><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Information Security today is Governed by Regulations, Standards, Guidelines and Industry Best Practices.&nbsp; They provide for frameworks, methodologies and approaches to attain Information Security baselines. Compliance to any of them is just meeting these baselines, but there is more to be done over and above the compliance.&nbsp; Compliance achievement is something that holds importance with &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-57","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry entry-center"],"_links":{"self":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/57","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/comments?post=57"}],"version-history":[{"count":1,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/57\/revisions"}],"predecessor-version":[{"id":198,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/57\/revisions\/198"}],"wp:attachment":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/media?parent=57"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/categories?post=57"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/tags?post=57"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}