Have you ever come across an IT governance acronym and wondered what it meant?
Well, we thought we'd document all the acronyms and terms within our industry with a brief description to help better your understanding. Find what you're looking for below.
We'd like to grow our glossary so if there are any terms you think we should add, or you're not sure of, please get in contact with us.
Click the below headers to reveal their definition.
APMG (also known as the APM Group) is a leading examination institute that accredits professional training and consulting organizations. The certification schemes they accredit include ITIL® and PRINCE2®.
As of summer 2013, AXELOS are the owners of ITIL® and PRINCE2®. AXELOS are a joint venture between Capita and the UK Cabinet Office.
A Business Continuity Management System (BCMS) is a life cycle of stages and activities that an organization does to continue normal business operations. It establishes, implements, operates, monitors, reviews and improves the organization's business continuity and resilience.
BCS is the Chartered Institute for IT which supports practitioners and establishes standards and frameworks to promote good working practices. It also provides a series of respected IT qualifications.
BS are British Standards produced/adopted by the UK's National Standards Body, the BSI Group.
The BSI Group is the UK's National Standards Body which represents the UK’s interests across European and international standards and organizations.
Business continuity is the term used to describe the activities that an organization performs in order to ensure the continuation of their critical services in the event of a disaster, disruption or similar crisis.
Read more about Business Continuity.
The Cabinet Office is a ministerial department, ensuring the effective running of the UK government. They have responsibility for a number of areas within government and up until summer 2013, owned the ITIL® and PRINCE2® methodologies. AXELOS have now taken ownership of these best practice methodologies.
Certification Bodies can externally and independently audit an organization’s management system and award the appropriate certification. If you are seeking certification, it is highly advisable to choose an accredited certification body. A certification body which has been accredited means that they have been independently assessed against international standards to demonstrate their competence, impartiality and performance capability. A list of UK accredited bodies can be found here >>
The Communications Electronics Security Group (CESG) is the UK government’s national authority for information assurance (IA). They provide services to protect electronic data and information within the interests of the UK government.
The Certified in the Governance of Enterprise IT (CGEIT) qualification is awarded by ISACA® and is designed to provide a premier certificate for professionals responsible for directing, managing or otherwise supporting the governance of IT in a large organization.
Read more about CGEIT.
This is the qualification for Certified Information Systems Auditors (CISA), awarded by ISACA®. It is accepted worldwide and will provide professionals with a stepping stone into information security auditor job roles.
Read more about CISA.
CISMP is the Certificate in Information Security Management Principle, awarded by BCS. It is an established and internationally-regarded foundation-level qualification which demonstrates a good knowledge and understanding of the key subject areas associated with information security management, including:
technical and management controls;
people and physical security;
security standards (e.g. ISO27001);
Read more about CISMP.
This is the qualification for Certified Information Systems, comprising 10 areas of study (the Common Body of Knowledge). The CISSP® certification provides information security professionals with an objective measure of competence and a globally recognized standard of achievement.
Read more about CISSP.
Sponsored by CESG, the CESG Listed Advisor Scheme (CLAS) is a list of approved and independent consultants. CLAS consultants meet the increasing demand for authoritative information assurance advice for UK Government departments and agencies.
Cloud computing is a variant of utility computing, where managed pool(s) of computing resources are made available on a convenient on-demand basis. It has minimal overheads, due to reduced management requirement and service provider interaction. A key characteristic is elasticity within the provisioning process, allowing rapid deployment and scaling back of the resource usage.
Read more about cloud computing.
Control Objectives for Information and Related Technology (COBIT) is an IT governance control framework. It helps organizations meet business challenges in the areas of regulatory compliance, risk management and aligning IT strategy with organizational goals. COBIT 5 replaces the guidance found in COBIT 4.1 and now integrates other major frameworks, standards and resources.
Read more about COBIT.
This is the analysis of information contained within and created by computer systems, in order to explain its present condition. This needs to be done in line with Rules of Evidence (i.e. the result needs to be in a format acceptable in court).
Read more about computer forensics.
Awarded by ISACA®, the Certified in Risk and Information Systems Control (CRISC) qualification is awarded to IT professionals who identify and manage risks through the development, implementation and maintenance of information systems (IS) controls.
Read more about CRISC.
CSME (Certification Subject Matter Experts) is an exam institute that supports all IT Certification schemes, including ITIL®. They provide certification experiences for both individuals and organizations.
Cybersecurity can be defined as the protection of systems, networks and data in cyber space. It is a critical issue for all businesses.
Read more about cybersecurity.
The Data Protection Act 1998 (DPA) applies to all organizations in the UK. All organizations that hold or process personal data MUST comply with the requirements of the DPA. The 8 key principals are to make sure your data:
is kept fairly and lawfully
is kept with specific and specified purposes
is adequate, relevant and not excessive
is accurate and up to date
is not retained for longer than necessary
is processed in accordance with individuals rights
is held with appropriate levels of security
is not transferred abroad without ensuring of adequate levels of legal protection.
Organizations found to be in breach of the DPA can be fined by the Information Commissioners Office (ICO) of up to £500K.
Read more about the ">DPA.
Ethical Hacking is also known as Penetration Testing and refers to the process of legitimately testing the security of an IT system using the same tools and methods employed by an illegal hacker. Effective Penetration Testing involves the simulation of a malicious attack against the system under test and should only be conducted by a certificated, ethical hacking professional.
Read more about Ethical Hacking.
EXIN® is a global Examination Institute that specializes in information management and helps professionals and organizations achieve certification. They set exams for the Best Management Practice Portfolio of Frameworks for professionals as well as their own qualifications.
Green Information Technology, or Green IT, is a catch-all phrase for sustainable, eco-friendly products, services, practices and management systems used in the information and communications technology sector.
It is becoming increasingly important for all businesses to act (and to be seen to act) in an environmentally responsible manner, both to fulfil their legal and moral obligations, but also to enhance their brand and image.
Read more about Green IT.
The International Board for IT Governance Qualifications (IBITGQ) is a not-for-profit association dedicated to the provision of training and the continued professional development of information security, business resilience and IT governance professionals.
Read more about IBITGQ.
The Information Commissioner's Office (ICO) upholds information rights of the public interest, giving guidance to organizations and citizens and takes appropriate action when the law is broken. They are a UK independent authority.
ISACA is an international professional association that engages the adoption of globally accepted knowledge and practices for information systems. It owns and manages a number of certifications and frameworks including CISA®, CISM®, COBIT® and Val IT™.
An Information Security Management System (ISMS) is a systematic approach to managing confidential or sensitive corporate information so that it remains secure (which means available, confidential and with its integrity intact). It encompasses people, processes and IT systems.
Read more about an ISMS.
ISO, the International Organization for Standardization develops international standards which specify products, services and good practice to make industry more efficient and effective.
Documents that are prefixed with ISO/IEC are jointly published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).
ISO 14001 is the International Organization for Standardization (ISO) standard relating to Environmental Management Systems, which can lead to certification. It provides a framework for an organization to control the environmental impacts of its activities, products and services, and to continually improve its environmental performance.
ISO 20000 is the International Organization for Standardization (ISO) standard which organizations can be externally, independently audited and certified against for their service management system (SMS).
Read more about ISO 20000.
ISO 22301 is the International Organization for Standardization (ISO) standard for Business Continuity, replacing BS25999 in 2012. The standard sets out the requirements for a Business Continuity Management System (BCMS) and describes how organizations maintain business processes through difficulties, disasters and other interruptions.
Read more about ISO 22301.
ISO 27001 is the International Organization for Standardization (ISO) standard describing the best practice for an Information Security Management System (ISMS), which maintains the availability, confidentiality and integrity of the assets of an organization.
Read more about ISO 27001.
This standard provides guidance in the form of a code of practice for the implementation of information security controls in any organization. Closely aligned with the ISO27001 Standard, ISO27002 serves as practical guideline for all staff who are required to initiate, implement and maintain an information security control.
ISO27005 is the International Organization for Standardization (ISO) standard that provides guidelines for effective information security risk management and directly supports the risk management approach as specified in ISO27001.
ISO 31000 provides principals and generic guidelines on risk management that can be applied throughout a wide range of activities within an organization.
Read more about ISO 31000.
ISO 38500 is the International Organization for Standardization (ISO) which provides guidance to those advising, informing or assisting directors on the effective and acceptable use of Information Technology (IT) within the organization. The standard sets out three activities for directors to engage in:
Read more about ISO 38500.
This is the international standard for Energy Management Systems that helps organizations develop an efficient energy management system and can be used to meet legal energy compliance and for winning new contracts.
Read more about ISO 50001.
ISO 9001 is a standard that specifies a Quality Management System designed to demonstrate, manage and improve quality of products and services. It covers:
Quality Management Systems
Realization (of customer requirements)
Measurement, analysis and improvement.
A framework for the leadership, organizational structures, business processes, standards and compliance to these standards, which ensures that an organization’s IT supports and enables the achievement of its strategies and objectives.
Read more about IT governance.
IT Governance is a comprehensive provider of information, advice, guidance, books, tools, training and consultancy for organizations that need to meet the evolving information security, risk management and compliance requirements
Read more about IT Governance Ltd.
IT-GRC is an acronym for IT governance, risk management and compliance.
IT health checks identify vulnerabilities in IT systems and networks which may compromise the confidentiality, integrity or availability of information held on that IT system.
Read more about an IT health check.
ITIL (IT Infrastructure Library®) is a series of best practices for IT service management. It is a methodology on how to manage IT services to meet customer expectations.
The current core ITIL (2011) manuals are—Service Strategy; Service Design; Service Transition; Service Operation; Continual Service Improvement.
ITIL® has a comprehensive qualification scheme that allows IT service management professionals to gain recognition of their level of ITIL and ITSM management competency. There are currently four levels of certification:
Read more about ITIL.
IT Service Management (ITSM) deals with the definition and user-focused delivery of IT infrastructure guidance and support, including hardware, software and communication facilities. ITSM is a set of processes and functions that help align IT with organizational goals and deliver value.
Read more about ITSM.
The IT Service Management Forum (itSMF) is a not-for-profit, independent and internationally recognized forum for IT service management professionals. With chapters around the world, itSMF allows members to exchange views, best practices and network, which in turn delivers significant value to their businesses.
Loyalist, also known as Loyalist Certification Services (LCS), is an examination institute that provides examinations and certification services for IT professionals and organizations.
Management of Risk (M_o_R) is a route map for risk management, bringing together principles, interrelated processes and pointers to more detailed sources of advice on risk management techniques and specialisms.
Read more about M_o_R.
Management of Value (MoV) is a value management methodology that can be utilized to get the best financial and non-financial benefits from programs, projects and portfolios. MoV matches the organization’s strategic goals with the agenda for the programs. These program s in turn deliver these goals through their underlying projects.
Read more about MoV.
Managing Successful Programmers (MSP) is the best practice methodology for program management.
MSP is designed to be used in conjunction with AXELOS’ other PPM methodologies: PRINCE2®, M_o_R®, MoV® and P3O®.
Read more about MSP.
N3 is the National network for the NHS, providing reliable IT infrastructure and services.
Read more about N3.
Portfolio, Programme and Project Offices (P3O) is a methodology from the AXELOS which gives guidance on establishing a P3O office within an organization.
P3O is aligned with PRINCE2®, MSP®, and M_o_R®, MoP®, MoV®—it brings together in one place a set of principles, processes and techniques to facilitate effective portfolio, program and project management through enablement, challenge and support structures - the P3O.
Read more about P30.
PAS, a Publicly Available Specification, is a sponsored fast-track standard that is driven by the needs of client organizations and developed according to the BSI guidelines.
PAS 555 is the Publicly Available Specification for Cyber Security Risk Governance and Management and defines what effective cybersecurity looks like. The approach in this standard allows organizations to choose how they achieve the specified outcomes of cybersecurity, irrespective of their size, type, nature of business or location.
The Payment Card Industry Data Security Standard (PCI DSS) is administered by the PCI Security Standards Council and aims to decrease payment card fraud across the internet and increase credit card data security. Organizations that store, transmit or process card holder data must comply with PCI DSS.
Read more about PCI DSS.
Pen Testing, short for Penetration Testing, examines IT systems, networks & applications to make sure they are secure against cyber-attacks. A pen test can encompass some or all of the following areas:
Web Application Testing
Internal Network Testing
Wireless Network Testing
Telecom Security Testing
VOIP Security Testing
Database Security Testing
Read more about pen testing.
The Project Management Institute (PMI®) provides individuals and organizations with standards and certifications to showcase best practice project management.
PPM, or Project, Programme and Portfolio Management, is the core collection of methods, processes and technologies used to manage a project or program that is based on numerous key characteristics. The main objective is to achieve the organization's operational and financial goals by using the best mix of resources.
PRINCE2 (Projects in Controlled Environments), is a project management method that deals with the organization, management and control of projects. Individuals can get certified against PRINCE2, which demonstrates their expertise in PRINCE2 and project management.
Read more about PRINCE2.
RSA Security LLC is a US network security company that organizes the annual RSA conference.
Six Sigma is a disciplined methodology that measures quality in an organization and eliminates defects. It focuses on process improvement and variation reduction, using six standard deviations to describe how a process is performing.
Service level agreements (SLAs) are commonly used for setting out how two parties have agreed that a specific service (usually, but not necessarily, IT-related) will be delivered by one party to another party. SLAs also define the standards or levels to which the service will be delivered. SLAs are a key part of the ITIL® approach to service management.
Read more about SLAs.
Service level management (SLM) deals with the monitoring and reporting on service levels. It ensures that the service levels within the SLAs are monitored and, if they are not met, the relevant processes are informed so that they can take the appropriate actions.
TickITplus, which replaced the TickIT scheme, is a software quality certification scheme designed to encourage good software development, auditing and certification practices.
Read more about TickITplus.
The Stationary Office (TSO) is one of the largest publishers in the UK, predominately for the public sector. It publishes the official ITIL® and PRINCE2® books, which are now owned by AXELOS.
Val IT consists of a governance framework, and supporting publications addressing the governance of IT-enabled business investments. Published by ISACA®, it has now been incorporated into the COBIT®5 IT governance best practice.
A "zero-day" (or zero-hour or day-zero) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application or operating system, which developers have not had time to address and patch. The term "zero-day" refers to the fact that the programmer has had zero days to fix the flaw (in other words, a patch is not available). Once a patch is available, it is no longer a "zero-day exploit." It is common for individuals or companies who discover zero-day attacks to sell them to anybody for a variety of purposes.