Whilst reading through the New Zealand Information Security Manual (NZISM) I came across this recommendation in section 9.4 Using the Internet within 9. Personnel security:
The Blog
Integrating Security Architecture into Enterprise Architecture
GCSB Publish the New Zealand Information Security Manual (NZISM)
Best, good or generally accepted practice?
Axenic Sponsor ISACA Wellington’s Security Education Day
Chris’ academic paper published
Chris’ academic paper “Using COBIT to guide the adoption of Enterprise 2.0 technologies” was published in BACIT in December 2009 and is available to download in PDF format from here.