{"id":6,"count":37,"description":"A host of\u00a0IT security governance blogs, articles, tips, blogs, infographics and free resources to help an IT professional like you in managing IT enterprise governance through CGEIT, CRISC and Cobit Framework among others.","link":"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/","name":"Popular Blogs on IT Security and Governance","slug":"it-security-governance","taxonomy":"category","parent":0,"meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v16.7 (Yoast SEO v16.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Security and Governance Blog | Top Governance Articles<\/title>\n<meta name=\"description\" content=\"Explore popular blogs on IT security and governance, featuring insights on risk management, compliance, cybersecurity trends, and best practices for enterprises.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security and Governance Blog - Information Security Governance Articles\" \/>\n<meta property=\"og:description\" content=\"Want to learn more about Information Security Governance? Find here the best articles to help you understand better what IT Security and Governance is all about.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/\" \/>\n<meta property=\"og:site_name\" content=\"Invensis Learning Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:title\" content=\"IT Security and Governance Blog - Information Security Governance Articles\" \/>\n<meta name=\"twitter:description\" content=\"Want to learn more about Information Security Governance? Find here the best articles to help you understand better what IT Security and Governance is all about.\" \/>\n<meta name=\"twitter:site\" content=\"@InvensisElearn\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#organization\",\"name\":\"Invensis Learning\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/invensislearn\/\",\"https:\/\/www.instagram.com\/invensis_learn\/\",\"https:\/\/www.linkedin.com\/company\/invensis-learning\/\",\"https:\/\/www.youtube.com\/channel\/UCq4xOlJ4xz6Fw7WcbFkrsUQ\",\"https:\/\/twitter.com\/InvensisElearn\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png\",\"contentUrl\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png\",\"width\":181,\"height\":47,\"caption\":\"Invensis Learning\"},\"image\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#website\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/\",\"name\":\"Invensis Learning Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.invensislearning.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"CollectionPage\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/#webpage\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/\",\"name\":\"IT Security and Governance Blog | Top Governance Articles\",\"isPartOf\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#website\"},\"description\":\"Explore popular blogs on IT security and governance, featuring insights on risk management, compliance, cybersecurity trends, and best practices for enterprises.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Popular Blogs on IT Security and Governance\"}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IT Security and Governance Blog | Top Governance Articles","description":"Explore popular blogs on IT security and governance, featuring insights on risk management, compliance, cybersecurity trends, and best practices for enterprises.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/","og_locale":"en_US","og_type":"article","og_title":"IT Security and Governance Blog - Information Security Governance Articles","og_description":"Want to learn more about Information Security Governance? Find here the best articles to help you understand better what IT Security and Governance is all about.","og_url":"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/","og_site_name":"Invensis Learning Blog","twitter_card":"summary","twitter_title":"IT Security and Governance Blog - Information Security Governance Articles","twitter_description":"Want to learn more about Information Security Governance? Find here the best articles to help you understand better what IT Security and Governance is all about.","twitter_site":"@InvensisElearn","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.invensislearning.com\/blog\/#organization","name":"Invensis Learning","url":"https:\/\/www.invensislearning.com\/blog\/","sameAs":["https:\/\/www.facebook.com\/invensislearn\/","https:\/\/www.instagram.com\/invensis_learn\/","https:\/\/www.linkedin.com\/company\/invensis-learning\/","https:\/\/www.youtube.com\/channel\/UCq4xOlJ4xz6Fw7WcbFkrsUQ","https:\/\/twitter.com\/InvensisElearn"],"logo":{"@type":"ImageObject","@id":"https:\/\/www.invensislearning.com\/blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png","contentUrl":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png","width":181,"height":47,"caption":"Invensis Learning"},"image":{"@id":"https:\/\/www.invensislearning.com\/blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.invensislearning.com\/blog\/#website","url":"https:\/\/www.invensislearning.com\/blog\/","name":"Invensis Learning Blog","description":"","publisher":{"@id":"https:\/\/www.invensislearning.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.invensislearning.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"CollectionPage","@id":"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/#webpage","url":"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/","name":"IT Security and Governance Blog | Top Governance Articles","isPartOf":{"@id":"https:\/\/www.invensislearning.com\/blog\/#website"},"description":"Explore popular blogs on IT security and governance, featuring insights on risk management, compliance, cybersecurity trends, and best practices for enterprises.","breadcrumb":{"@id":"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.invensislearning.com\/blog\/it-security-governance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.invensislearning.com\/blog\/it-security-governance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Popular Blogs on IT Security and Governance"}]}]}},"_links":{"self":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/categories\/6"}],"collection":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/taxonomies\/category"}],"wp:post_type":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/posts?categories=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}