• According to the US Office of the Inspector General
(OIG), COBIT Security Baseline was one of two tool sets
for information security programme reviews that were
compatible with the National Institute of Standards and
Technology (NIST) Framework for performing Federal
Information Security Management Act (FISMA) evaluations.
1 From an ancient Cossack folk song, adapted by Pete Seeger
in 1955 into ‘Where Have All the Flowers Gone?’
2 Then, actually still called the EDP Auditors Association. The
name changed to ISACA in 1994.
3 The council was made up of Svein Dovran, Bjorn Hamplund,
Henning Walmar, Gary Hardy, Serge Yablonski, Archie
Watt and Erik Guldentops.
ON THIS BATTLEFIELD, EDUCATION
is yoUr bEst dEfEnsE.
Cyber attacks are being waged all over the world,
creating an unprecedented demand for trained
professionals to protect our country’s data assets
and develop cybersecurity policy. Help meet the
demand with a bachelor’s or master’s degree or
graduate certificate in cybersecurity. Whether
you plan to work for Cyber Command taking
down cyber terrorists or for private industry
battling hackers, UMUC can make it possible.
• designated as a national Center of
Academic Excellence in information
Assurance Education by the nsA and dHs
• bs and Ms in cybersecurity, Ms in
cybersecurity policy, and three graduate
• Programs offered entirely online
• financial aid and an interest-free monthly
payment plan available
800-888-UMUC • umuc.edu/cyberedge
ISACA JOURNAL VOLUME 4, 2011
5/27/11 2: 26 PM