I am Joshua, a certified security architect (CISSP, CISM). I have created this to assist organisations in establishing effective governance practices, regardless of in-house expertise.
Version | Release Date | Status | Summary of Changes |
---|---|---|---|
1.0.0 | 2025-08-12 | Current | Initial release |
A standard is only as effective as it’s implementation and successful implementations can only happen in organisations with the close cooperation of the leadership, the staff and the volunteers. The goal of governance is not to penalise but to provide the organisation direction and guidance on how bring to best protect the organisation’s IT assets.
These documents are provided “as-is” without any warranty. The author has made every best effort regarding the accuracy and completeness of the information contained in these documents. You assume all risks associated with their use, including claims, damages, or expenses arising from your reliance.
In no event will the author be liable to you or any third party for any direct, indirect, incidental, special, consequential, or punitive damages arising out of the use of this document, even if advised of the possibility of such damage. This includes but is not limited to: