{"id":26536,"date":"2020-04-12T09:09:06","date_gmt":"2020-04-12T09:09:06","guid":{"rendered":"https:\/\/sysprove.com\/ar\/?page_id=26536"},"modified":"2020-06-25T08:56:05","modified_gmt":"2020-06-25T08:56:05","slug":"information-security-governance-architecture-information-security","status":"publish","type":"page","link":"https:\/\/sysprove.com\/ar\/cyber-security-governance\/information-security-governance-architecture-information-security\/","title":{"rendered":"\u062a\u0646\u0638\u064a\u0645 \u0648\u0647\u0646\u062f\u0633\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0631\u0642\u0645\u064a\u0651"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;notice-section&#8221;][vc_column]<div class=\"gem-icon-with-text gem-icon-with-text-icon-size-medium\"><div style=\"margin-bottom:0px;padding-left: 20pxpx;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-medium  gem-icon-shape-square gem-simple-icon\" style=\"opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: #0082a1;\"><span class=\"back-angle\">&#xf244;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #0082a1;\"><span class=\"back-angle\">&#xf244;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\">[vc_column_text css_animation=&#8221;bottom-to-top&#8221;]<\/p>\n<p style=\"text-align: right;\"><strong>\u0646\u0638\u0631\u064b\u0627 \u0644\u0644\u0645\u0635\u0637\u0644\u062d\u0627\u062a \u0627\u0644\u062a\u0642\u0646\u064a\u0651\u0629 \u0648\u0627\u0644\u062a\u062c\u0627\u0631\u064a\u0651\u0629 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u0629 \u0641\u064a \u0648\u0635\u0641 \u0647\u0630\u0647 \u0627\u0644\u062e\u062f\u0645\u0629 \u0648\u0627\u0633\u062a\u062e\u062f\u0627\u0645\u0647\u0627 \u0627\u0644\u0639\u0645\u0644\u064a\u0651\u060c \u062a\u0645\u0651 \u0639\u0631\u0636 \u0647\u0630\u0647 \u0627\u0644\u0635\u0641\u062d\u0629 \u0628\u0627\u0644\u0651\u0644\u063a\u0629 \u0627\u0644\u0625\u0646\u062c\u0644\u064a\u0632\u064a\u0651\u0629\u060c <a href=\"https:\/\/sysprove.com\/ar\/contact-us\/\">\u062a\u0648\u0627\u0635\u0644 \u0645\u0639\u0646\u0627<\/a> \u00a0\u0625\u0646 \u0623\u0631\u062f\u062a \u0627\u0644\u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u0634\u0631\u062d \u0628\u0627\u0644\u0651\u0644\u063a\u0629 \u0627\u0644\u0639\u0631\u0628\u064a\u0651\u0629 \u0648\u0633\u062a\u0643\u0648\u0646 \u0645\u0633\u0627\u0639\u062f\u062a\u0643 \u0645\u0646 \u062f\u0648\u0627\u0639 \u0633\u0631\u0648\u0631\u0646\u0627.<\/strong><\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div>[\/vc_column][\/vc_row][vc_section full_width=&#8221;stretch_row&#8221; el_class=&#8221;english-text&#8221;][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_empty_space height=&#8221;2rem&#8221;][vc_column_text]<\/p>\n<div class=\"container\">\n<div class=\"page-title-title\">\n<h3 style=\"text-align: center;\">INFORMATION SECURITY GOVERNANCE &amp; ARCHITECTURE<\/h3>\n<\/div>\n<\/div>\n<div class=\"breadcrumbs-container\"><\/div>\n<p>[\/vc_column_text][vc_column_text]Information Security Governance &amp; Architecture is the process of defining an organisational-wide information security framework that is driven from the business needs and objectives. The aim is to allow security to be a business-enabler through not only addressing risks but enabling opportunities.[\/vc_column_text]<div class=\"clearboth\"><\/div><div class=\"gem-divider \" style=\"margin-top: 40px;\"><\/div>[vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1585141151873{margin-bottom: 2.5rem !important;}&#8221;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26148&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-light silver-filter&#8221; css=&#8221;.vc_custom_1585141324514{margin-bottom: 0px !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1589436863212{margin-bottom: 0px !important;}&#8221;]<b class=\"blueish\">Our approach <\/b>is based on industry leading \u00a0frameworks such as SABSA\u00ae, <a href=\"https:\/\/sysprove.com\/ar\/cyber-security-governance\/iso-27001-preparation\/\">ISO 27001<\/a>, NIST, COBIT\u00ae, and ITIL\u00ae together with other specific standards and regulations as required by the organisation.<\/p>\n<p>One of the key frameworks we reference is SABSA\u00ae, which is a proven methodology for developing business-driven, risk and opportunity focused Security Architectures at both enterprise and solutions level that are traceable to \u00a0business objectives. SABSA\u00ae is the leading methodology for delivering cohesive information security solutions to enterprises.\u00a0 The SABSA\u00ae Framework ensures that the security needs of an organisation are met completely and are designed, delivered and supported as an integral part of the IT management infrastructure.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;3.75rem&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1590581260946{background-color: #efefef !important;}&#8221; el_class=&#8221;english-text&#8221;][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_id=&#8221;includes&#8221;][vc_column offset=&#8221;vc_col-lg-8 vc_col-md-12 vc_col-xs-12&#8243;][vc_empty_space height=&#8221;2rem&#8221;][vc_column_text]<\/p>\n<h6><span style=\"color: #77787b;\">Benefits to client:<\/span><\/h6>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;2rem&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1588673204730{margin-bottom: 2.5rem !important;}&#8221; el_class=&#8221;mb-0&#8243;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26542&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221; css=&#8221;.vc_custom_1589438047769{margin-bottom: 0px !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1589436999363{margin-bottom: 0px !important;}&#8221;]<b class=\"blueish\">Information Security <\/b>aligned with the organisational objectives[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#cecece&#8221; el_class=&#8221;mts-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1588673204730{margin-bottom: 2.5rem !important;}&#8221; el_class=&#8221;mb-0&#8243;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26647&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221; css=&#8221;.vc_custom_1589438021745{margin-bottom: 0px !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1589437123084{margin-bottom: 0px !important;}&#8221;]<b class=\"blueish\">Availability of a robust <\/b>\u00a0information security strategy and Governance Model[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#cecece&#8221; el_class=&#8221;mts-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1588673220952{margin-bottom: 2.5rem !important;}&#8221; el_class=&#8221;mb-0&#8243;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;25794&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221; css=&#8221;.vc_custom_1589438231198{margin-bottom: 0px !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1589437181991{margin-bottom: 0px !important;}&#8221;]<b class=\"blueish\">Through-life focus <\/b>on information security, enabling the organization to embed security at a project level[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#cecece&#8221; el_class=&#8221;mts-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1588673220952{margin-bottom: 2.5rem !important;}&#8221; el_class=&#8221;mb-0&#8243;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26631&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221; css=&#8221;.vc_custom_1589438260832{margin-bottom: 0px !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1586682517321{margin-bottom: 0px !important;}&#8221;]<b class=\"blueish\">Information Security Governance Working Documents<\/b> used to ensure security of systems[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#cecece&#8221; el_class=&#8221;mts-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1588673236215{margin-bottom: 2.5rem !important;}&#8221; el_class=&#8221;mb-0&#8243;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26541&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221; css=&#8221;.vc_custom_1589438325101{margin-bottom: 0px !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1589437242519{margin-bottom: 0px !important;}&#8221;]<b class=\"blueish\">Practical and relevant Information Security Policies<\/b> aligned with ISO 27001 and other applicable frameworks[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;2rem&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-md vc_hidden-sm vc_hidden-xs&#8221;][vc_single_image image=&#8221;27147&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow_border&#8221; css_animation=&#8221;fadeInRight&#8221;][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;notice-section&#8221;][vc_column][\/vc_column][\/vc_row][vc_section full_width=&#8221;stretch_row&#8221; el_class=&#8221;english-text&#8221;][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_empty_space height=&#8221;2rem&#8221;][vc_column_text] INFORMATION SECURITY GOVERNANCE &amp; ARCHITECTURE [\/vc_column_text][vc_column_text]Information Security Governance &amp; Architecture is the process&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":26629,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/pages\/26536"}],"collection":[{"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/comments?post=26536"}],"version-history":[{"count":0,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/pages\/26536\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/pages\/26629"}],"wp:attachment":[{"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/media?parent=26536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}