An Analytical study of IT Security Governance and its adoption in Australian Organisations

Research output: Book chapter/Published conference paperConference paperpeer-review

1 Citation (Scopus)
6 Downloads (Pure)

Abstract

Contemporary organisations are at infancy stages of adopting IT governance processes in Australia. Organisations who have adopted these processes underestimate the security processes within the governance framework. If the security processes are designed, they are often flawed with operational level implementation. This study investigates IT security governance broadly and in Australian organisations specifically. The objective of this study is to bring the local organisations in alignment with international standards and frameworks in terms of integration of information security, IT audits, risks and control measures. A survey of selected organisations is completed and results are presented in this paper identifying the maturity level of IT security governance in Australian organisations against the well known Capability Maturity Model® (CMM.)
Original languageEnglish
Title of host publicationSecAU 2010
Subtitle of host publication8th Australian Digital Forensics (ADF) Conference
EditorsChristopher Bolan
Place of PublicationPerth, WA
Publishersecau - Security Research Centre, ECU
Pages182-194
Number of pages13
ISBN (Electronic)9780729806886
Publication statusPublished - 2010
EventSecurity Research Centre (SECAU) Conference - Perth, WA, Australia
Duration: 29 Nov 201002 Dec 2010

Conference

ConferenceSecurity Research Centre (SECAU) Conference
Country/TerritoryAustralia
Period29/11/1002/12/10

Fingerprint

Dive into the research topics of 'An Analytical study of IT Security Governance and its adoption in Australian Organisations'. Together they form a unique fingerprint.

Cite this