CPE Self-Study
Information Security Governance
Group Pricing
This product offers a group pricing option. Contact us for details.
Contact us
Information Technology
Online: 11.5
Provides participants with the knowledge and tools needed to maintain an effective framework for information security governance.

CITP credential holders qualify for additional discounts

When you log into this website with your AICPA member user account, the section discount will be automatically applied during checkout. Should you have any questions or encounter any issues, please contact the AICPA Service Center at 888-777-7077 or service@aicpa.org.

CPE On-Demand
AICPA’s online CPE courses will operate in a variety of configurations, but only the configuration described below is supported by our technicians.

A stable and continuous internet connection is required
In order to record your completion of the online learning courses, please ensure you are connected to the internet at all times while taking the course. It is your responsibility to validate that CPE certificate(s) are available within your My Account after successfully completing the course and/or exam. Please contact us at 1.888.777 or use chat to connect with a live agent (Mon-Fri 9am-8pm ET) with any questions or concerns related to your CPE certificate(s).

Supported Operating Systems:

  • Macintosh OS X 10.10 to present
  • Windows 7 to present

Supported Browsers:

  • Apple Safari
  • Google Chrome
  • Microsoft Internet Explorer
  • Mozilla Firefox

Required Browser Plug-ins:

Note: Your course will be accessible immediately after completing your purchase. Access instructions will be shown on the Order Confirmation Screen and included in your Order Confirmation Email, or click My Account at the top of the page, select My Purchases and then My Online Learning tab.

Technical Support: Please contact us at 888-777-7077 or use chat to connect with a live agent (Mon-Fri 9am-8pm ET).

Accessibility: The Association of International Certified Professional Accountants (Association) is dedicated to removing barriers to the accountancy profession and ensuring that all accountancy professionals and other members of the public with an interest in the profession or joining the profession, including those with disabilities, have access to the profession and the Association’s website, educational materials, products, and services.  The Association is committed to making professional learning accessible to all.  This commitment is maintained in accordance with applicable law.  For additional information, please refer to the Association’s Website Accessibility Policy.

If this symbol is displayed under Delivery Type on the product page, this product offers closed captioning.

For accommodation requests, please contact adaaccessibility@aicpa-cima.com and indicate the product that you are interested in (title, etc.) and the requested accommodation(s): Audio/Visual/Other. A member of our team will be in contact with you promptly to make sure we meet your needs appropriately.

Product details

The essential competencies you need to understand information security strategies.

Who Will Benefit

  • Auditors
  • Accounting professionals
  • Technology employees
  • Leaders & Executives
  • Technology Managers
  • Anyone with responsibilities in finance
  • Policy administrators
  • IT staff
  • CPAs interested in the CITP credential

Key Topics

  • Elements of security policy
  • Organizational risk assessment
  • Identity and access management
  • Logical and physical access controls
  • Network and system security controls
  • Buiness continuity planning
  • Disaster recovery

Learning Objectives

  • Recognize and differentiate information security policies and strategies to guide the development of standards and procedures, in alignment with organizational goals and objectives.
  • Identify and analyze risk management processes and procedures to ensure compliance with applicable security, privacy laws and regulations.
  • Identify and differentiate among the four types of access control: identification, authentication, authorization, and accountability.
  • Identify logical and physical access controls necessary to safeguard critical systems and information pursuant to compliance requirements.
  • Identify incident response processes for detecting and responding to security risks.
  • Determine the proper steps to implement comprehensive business continuity, disaster recovery, and incident response plans.

Information security governance is an essential part of any organization or firm's cybersecurity strategy. This CPE course will provide participants with the knowledge and tools needed to maintain an effective framework for information security governance. You will also recognize the policies, controls and countermeasure procedures to ensure proper control and compliance over confidentiality, availability and information.

Please note: If you are seeking the CITP credential this course provides essential competencies on the learning pathway towards understanding information security strategies to help guide and maintain access control polices and procedures in alignment with organizational objectives and compliance requirements.

Ratings and reviews

Gwen Bettwy

President - Security Content and Teaching

Ms. Gwen Bettwy, CISSP, SSCP, provides content development and knowledge product development services for the creation of Instructor Led Training (ILT), online, e-Learning training, and self-study knowledge products for IT security curricula and courseware. She incorporates instructional design methodology in the creation of knowledge transfer solutions for professional training and certification programs.

Ms. Bettwy's career and technical background over 15 years of technical engineering, technical management, and P&L management in the IT field. This experience includes wide area networking technologies such as Frame Relay/X.25, ATM, IP broadband networks, LAN/WAN internetworking, enterprise network management, and IT security.

Prior to joining TSI, Ms. Bettwy was a Cisco Certified Systems Instructor (CCSI) teaching Cisco Internetworking and Security training courses throughout the world. Ms. Bettwy's IT consulting experience includes a wide variety of IT technologies and systems/applications. Her expertise is in the design, creation, and program management of large-scale development projects for ILT, online, e-Learning, or self-study knowledge products. Currently, Ms. Bettwy is an (ISC)2 Certified Instructor and teaches the CISSP and SSCP CBK Review Seminars.

Mark Williams

Vice President - Security Training & Courseware

Mr. Mark Williams, CISSP and (ISC)2 Certified Instructor, is a Vice President working in our Consulting Business Unit responsible for designing, supporting, and advising clients on IT security strategies. For the past 18 years, Mr. Williams has been in the field of technical engineering, IT technologies, and IT security. Mr. Williams has been a professional instructor for the past seven years teaching various IT technical training courses specializing in advanced TCP/IP, LAN/WAN, Internetworking, and IT security technologies. Mr. William's professional teaching experience was obtained from contracted teaching assignments with the leading IT and IT security training companies in the world namely Global Knowledge, EnteraSys, Netarch, Foundstone, (ISC)2 and (ISC)2 Institute.

Currently, Mr. Williams is an (ISC)2 Certified Instructor and teaches the CISSP and SSCP CBK Review Seminars for (ISC)2 Institute. In addition, Mr. Williams provides consulting services for our IT Security Consulting business unit conducting vulnerability assessments, penetration tests, and IP-VPN designs and configurations.

Mr. Williams's career and technical background covers 18 years of technical engineering and management in the IT field. This experience includes wide area networking technologies such as Frame Relay, ATM, IP broadband networks, LAN/WAN internetworking, enterprise network management, and IT security. During this career, Mr. Williams has held various certifications including Enterasys Systems Engineer (ESE), Enterasys Systems Certified Trainer (ESCT), Brocade Certified Fabric Professional (BCFP) and Cisco Certified Network Associate (CCNA).

Prior to establishing his own company as an independent IT security instructor and consultant, Mr. Williams worked as a defense contractor at the Air Combat Environment Test and Evaluation Facility (ACETEF) in Patuxent River, MD where he served as the Network Operations Manager and Information Systems Security Officer (ISSO). In this role, Mr. Williams was responsible for the design, implementation, configuration, security and day to day support for LAN/WAN network infrastructures ranging from unclassified to Top Secret level.

From 1986 to 1995, Mr. Williams proudly served as an Aviation Electronics Technician in the United States Navy. During his service, Mr. Williams supported numerous campaigns. The most notable of which include Operation Desert Shield, Operation Desert Storm and Operation Provide Comfort.

Mike Beevers

Vice President - Security Training & Courseware

Mr. Mike Beevers, CISSP presides over training, custom course development and content delivery of enterprise security courses. Mr. Beevers is a Certified Cisco Systems Instructor ( CCSI) and Authorized (ISC) 2 instructor. Since 1997, Mr. Beevers has been an Information Systems Security consultant and professional instructor teaching various Information Technology training courses specializing in IT security, advanced TCP/IP, LAN/WAN, Internetworking, and Patch Management.

As a lead consultant, Mr. Beevers creates, evaluates and implements enterprise security policy, practices and procedures as well as conducting enterprise security and vulnerability assessments. Mr. Beevers has assisted developing enterprise security frameworks which enable companies to comply with current regulations and legislation. In 2006, Mr. Beevers worked with the State of Maryland performing a vulnerability assessment as well as testing and verifying the security functions of Maryland's Online Voter Registration System.

Prior to becoming an enterprise trainer along with Gwen and Mike, Mr. Beevers owned and operated a consulting business that provided IT consulting and training services. During the 10 years that Mr. Beevers operated this practice, he also consulted with Security Evolutions Inc. where he helped design and implement the security architecture, IT infrastructure upgrade and Business Continuity/Disaster Recovery Plan for the University of the Virgin Islands.

Mr. Beevers has over 20 years of IT and technology experience in telecommunications, LAN/WAN internetworking technologies, and IT Security. Mr. Beevers began his career in technology in the United States Navy as an Electronics Technician and later as an Electronics Warfare Operator specializing in electronic intelligence gathering. After his 9 years of military experience, Mr. Beevers worked for the DoD at the Air Combat Environment Test and Evaluation Facility (ACETEF) in Patuxent River Maryland. Following this work experience Mr. Beevers started his consulting firm, Computer Bytes of SMD. Inc. in 1997. Mr. Beevers has obtained the following professional certifications during his technical career: MCSE, CISSP, CCNA, CCSI, TICSA.


American Institute of CPAs

The American Institute of CPAs (AICPA) is the world’s largest member association representing the CPA profession, with more than 418,000 members in 143 countries, and a history of serving the public interest since 1887. AICPA members represent many areas of practice, including business and industry, public practice, government, education and consulting.

The AICPA sets ethical standards for the profession and U.S. auditing standards for private companies, nonprofit organizations, federal, state and local governments. It develops and grades the Uniform CPA Examination, and offers specialized credentials for qualified professionals who concentrate on personal financial planning; forensic accounting; business valuation; and information management and technology assurance. With The Chartered Institute of Management Accountants (CIMA), it offers the Chartered Global Management Accountant (CGMA) designation, which sets the global benchmark for quality and recognition in management accounting.

The AICPA and CIMA also make up the Association of International Certified Professional Accountants (the Association), which represents public and management accounting globally, advocating on behalf the public interest and advancing the quality, competency and employability of CPAs, CGMAs and other accounting and finance professionals worldwide.

The AICPA maintains offices in New York, Washington, DC, Durham, NC, and Ewing, NJ.

Member Quantity:
Nonmember Quantity:
Estimated total:
Add to cart
CPE credits
: 11.5
NASBA Field of Study
Information Technology
Delivery Method
QAS Self-Study
Course acronym
Contact a representative for group pricing.
Telephone: 800.634.6780 (Option 1)
Contact us online
Back to Top