Cyber Security IT Governance UK

  • Nine Steps to SOC 2 Compliance – Including a SOC 2 Readiness Checklist
    by IT Governance on August 14, 2025 at 5:39 pm

    SOC (System and Organization Controls) audits provide an independent assessment of the risks associated with using service organisations and other third parties. SOC 2 audits assess service organisations’ security, availability, processing integrity, confidentiality and privacy controls against the AICPA (American Institute of Certified Public Accountants) TSC (Trust Services Criteria). A SOC 2 report is generally aimed at existing or prospective clients, and is used to assess how well an organisation safeguards customer data and how effectively its internal controls operate. This blog outlines nine steps that will help you understand what SOC 2 requires, prepare your controls and documentation, and approach your The post Nine Steps to SOC 2 Compliance – Including a SOC 2 Readiness Checklist appeared first on IT Governance Blog.

  • What are the Different Types of Penetration Test?
    by IT Governance on August 5, 2025 at 1:03 pm

    And how do you choose the right one for your needs? Penetration testing (also known as ‘pen testing’ or ‘ethical hacking’) offers a vital tool for identifying gaps and opportunities to strengthen your security programme. We asked our head of security testing, James Pickard, to explain the different types of test. In this interview Is your security programme effective? Hi James. What are key challenges when implementing a security programme? Resources and costs are often top of the list. Many organisations have a tight budget for security, and lack in-house specialist skills – which doesn’t combine well with the fact The post What are the Different Types of Penetration Test? appeared first on IT Governance Blog.

  • The 4 CRISC Domains Explained
    by Neil Ford on July 28, 2025 at 4:09 pm

    The CRISC® (Certified in Risk and Information Systems Control®) certification from ISACA® is a globally recognised credential for IT and business professionals. Launched in 2010, it has become the benchmark for validating expertise in enterprise risk governance and control management. CRISC is aimed at those operating in or aspiring to work in IT risk management roles, such as risk analysts, control professionals, IT managers and compliance officers. It bridges technical knowledge and strategic risk governance capability. Over 30,000 professionals hold CRISC certifications today. What are the 4 CRISC domains? The CRISC exam tests candidates across four domains, structured to reflect The post The 4 CRISC Domains Explained appeared first on IT Governance Blog.

  • What Are ISO 27017 and ISO 27018, and What Are Their Controls?
    by IT Governance on July 23, 2025 at 3:36 pm

    Extending your ISMS to address Cloud security risks ISO 27001 sets out the specification for an ISMS (information security management system). But did you know you can extend your ISO 27001 ISMS to cover specific aspects of Cloud security? Let’s take a closer look at both ISO 27017 and ISO 27018. Note: The current versions of ISO 27017 and ISO 27018, ISO/IEC 27017:2015 and ISO/IEC 27018:2019, are aligned to the previous (2013) edition of ISO 27002. The ISO 27001:2022 standard completely reorganises the control set, adding 11 new controls, including 5.23: Information security for use of Cloud services. No old The post What Are ISO 27017 and ISO 27018, and What Are Their Controls? appeared first on IT Governance Blog.

  • The 9 CISMP Domains Explained
    by Neil Ford on July 21, 2025 at 3:27 pm

    The CISMP (Certificate in Information Security Management Principles) is one of the UK’s most widely recognised entry-level qualifications for information security professionals. Accredited by BCS, The Chartered Institute for IT, it provides a comprehensive foundation in cyber security and information security management. CISMP is designed for individuals working in, or aspiring to work in, security-related roles – particularly those seeking to progress into management or governance positions. It is also suitable for business professionals who need a broader understanding of information security as part of their wider operational responsibilities. It is frequently cited as the first step towards more advanced The post The 9 CISMP Domains Explained appeared first on IT Governance Blog.

  • The 4 CISM Domains Explained
    by Neil Ford on July 14, 2025 at 3:34 pm

    The CISM® (Certified Information Security Manager®) qualification from ISACA® is one of the most widely respected credentials for information security professionals. It demonstrates not only technical expertise, but also the strategic insight required to build, manage and improve enterprise-level security programmes. Since its launch in 2002, CISM has become a globally recognised benchmark for senior roles in information security governance, risk and incident management. It is accredited under ISO/IEC 17024 and was named Best Professional Certification Program in the SC Awards 2025 – a reflection of its continued relevance and high industry regard. CISM is designed for individuals who manage, The post The 4 CISM Domains Explained appeared first on IT Governance Blog.

  • Information Security vs Cyber Security: The Difference
    by IT Governance on July 9, 2025 at 11:57 am

    You’ll often see the terms cyber security and information security used interchangeably. That’s because, in their most basic forms, they have the same aim: protecting the confidentiality, integrity and availability of information. This is also known as the ‘CIA triad’: But ‘cyber’ and ‘information’ security have a crucial difference, which this blog explains. In addition, although many people default to ‘cyber security’, simply using the phrase ‘information security’ more can help improve your organisation’s security. We’ll explain how in this blog. In this blog What is cyber security? Cyber security looks to protect digital or electronic data, as well as the networks and systems The post Information Security vs Cyber Security: The Difference appeared first on IT Governance Blog.

  • The 5 CISA Domains Explained
    by Neil Ford on July 7, 2025 at 2:34 pm

    The CISA® (Certified Information Systems Auditor®) credential, awarded by ISACA®, is the gold standard for IT audit, control and assurance professionals. Since its introduction in 1978, it has been one of the most sought-after qualifications for audit, risk and compliance leadership positions. CISA covers five domains, updated in August 2024 to reflect changes in technology, risk management and governance frameworks. Regular domain updates ensure the exam stays aligned with real-world job roles and emerging industry trends. What are the 5 CISA domains? CISA domain Exam weighting 1. Information Systems Auditing Process 18% 2. Governance & Management of IT 18% 3. The post The 5 CISA Domains Explained appeared first on IT Governance Blog.

  • 7 Steps to a Successful ISO 27001 Risk Assessment (Updated for 2025)
    by IT Governance on July 2, 2025 at 2:35 pm

    Risk assessments remain central to ISO 27001 compliance in 2025, ensuring your ISMS (information security management system) is robust and effective. ISO 27001:2022 and ISO 27002:2022 introduced several updates that organisations should incorporate into their risk assessment processes. Here are the seven essential steps for conducting a successful ISO 27001 risk assessment in line with current best practices. 1. Define your risk assessment methodology ISO 27001 does not prescribe a single methodology. Rather, organisations must tailor the approach to fit their needs. Your methodology should clearly define: Consistency and clarity in these definitions ensure reliable and comparable results across your The post 7 Steps to a Successful ISO 27001 Risk Assessment (Updated for 2025) appeared first on IT Governance Blog.

  • Building Your Cyber Security Career: The Credentials Needed for Management and Specialist Roles
    by IT Governance on June 30, 2025 at 11:42 am

    In a recent webinar hosted by IT Governance, Andy Johnston (divisional director for training), Nikolai Nikolaev (information security specialist) and Soji Obunjobi (cyber security specialist) shared valuable insights into navigating a career in cyber security, with particular focus on the qualifications and experience needed for management and specialist roles. This blog summarises key takeaways from the webinar, providing guidance on career pathways, essential certifications and the skills required to advance in the cyber security field. You might also be interested in our blog How to Start Your Career in Data Protection and Privacy. The growing demand for cyber security professionals The post Building Your Cyber Security Career: The Credentials Needed for Management and Specialist Roles appeared first on IT Governance Blog.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.