This report provides a comprehensive overview of cyber security in IT governance, discussing the core concepts of security governance and its importance in protecting organizational data. It explores the design of security measures, including leadership involvement, strategy alignment, policy management, and user account security. The report details risk management processes, such as identifying and mitigating cyber security risks, and highlights the significance of gap analysis in addressing unmitigated risks, particularly in BYOD environments. It outlines the attributes of a good security strategy, emphasizing its endorsement, relevance, realism, attainability, adaptability, enforceability, and inclusivity. The report also presents the pros and cons of the COBIT model, Capability Maturity Model, and ISO 27001 model, providing insights into their strengths and weaknesses. Furthermore, it covers information security management metrics, including preparedness levels, intrusion attempts, and incident response times, and concludes with recommendations for enhancing cyber security practices, such as implementing firewalls, providing training, and using multi-factor identification.