IT Governance, Risk, and Compliance:

September, 2009

1

September 28, 2009  6:11 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part III

Robert Davis Robert Davis Profile: Robert Davis

When the relative humidity is high, water particulates are formed corresponding to the heat index. High humidity can warp hardware configuration cards. In addition, without adequate insulation, any conditions that cause...

September 24, 2009  7:03 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part II

Robert Davis Robert Davis Profile: Robert Davis

Climatically, strategizing optimum environmental conditions for information assets is a managerial safeguarding responsibility....


September 21, 2009  6:24 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part I

Robert Davis Robert Davis Profile: Robert Davis

'Plug-and-Play' devices should never be regarded as 'Install-and-Forget' hardware. Though computer operations personnel are normally responsible for IT related hardware implementations,...


September 17, 2009  7:15 PM

Supporting ISG Deployment – Part V

Robert Davis Robert Davis Profile: Robert Davis

What ever your perspective may be, the importance of effective and efficient ISG cannot be overlooked in the current global high technology environment. Considering what is at stake for most entities, when security is compromised, usually justifying


September 14, 2009  6:19 PM

Supporting ISG Deployment – Part IV

Robert Davis Robert Davis Profile: Robert Davis

If, however, you assume ISG provides financial and/or reputational benefits, potential stakeholders are presumed to rely upon governance elements prior to investing their time, talent, and/or money. Therefore, ascertaining the effectiveness and efficiency of entity-centric information security...


September 10, 2009  9:01 PM

Supporting ISG Deployment – Part III

Robert Davis Robert Davis Profile: Robert Davis

Alternatively, if you perceive ISG as a descriptive prescription for achieving managerial objectives, the adopted ISG methodology should provide security assessments defining strategic, tactical, and operational risks. Management usually is...


September 8, 2009  6:56 PM

Supporting ISG Deployment – Part II

Robert Davis Robert Davis Profile: Robert Davis

If you envision ISG as a framework servicing entity and 'IT governance', then structurally, ISG should be implemented as an organizational program with objectives,...


September 3, 2009  8:04 PM

Supporting ISG Deployment – Part I

Robert Davis Robert Davis Profile: Robert Davis

Traversing to and aligning with potential 'Governance Tree' third-tier abstraction levels; information security governance (ISG) can be viewed as a framework, methodology, or technique. Framing ISG enables a...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: