IT Governance, Risk, and Compliance:

October, 2009

1

October 29, 2009  8:13 PM

First-Tier Governance Development – Part III



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Depending on an entity's technological advancement, information may be conveyed and received through visual, auditory, as well as sensation receptors that enable current or future processing of presented information for decisional application. The list of communicated expectations extends to...

October 26, 2009  7:44 PM

First-Tier Governance Development – Part II



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Information and decision theories have point convergences when conjoined with the binodal Governance Tree depicting entity relationships. Information theory practice domains include data processing systems design, organization analysis, and...


October 22, 2009  5:55 PM

First-Tier Governance Development – Part I



Posted by: Robert Davis
CISM, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, ISG, ISM, Node, Stakeholder

Organizationally, governance is the system by which entities are directed and controlled. "Potential stakeholders usually rely upon governance elements prior to...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


October 19, 2009  7:12 PM

Service Restoration Planning – Part IV



Posted by: Robert Davis
Availability, Backup Plan, BCP, Business Continuity Plan, Crisis, Disaster, Disaster Recovery Plan, Disruption, DRP, Emergency, Service Restoration Plan, SRP

Considering information systems are generally critical to enhancing productivity, it is imperative deployed IT provide availability with service responsiveness meeting user utilization demands, even during crisis situations. Entity susceptibility as well as IT operational resiliency impact...


October 15, 2009  6:32 PM

Service Restoration Planning – Part III



Posted by: Robert Davis
Availability, Backup Plan, BCP, Business Continuity Plan, Crisis, Disaster, Disaster Recovery Plan, Disruption, DRP, Emergency, Service Restoration Plan, SRP

Cost effective strategies should be designed to prevent, detect and/or mitigate the impact of potential crises. Reducing system vulnerabilities is typically accomplished by delineating then remediating single as well as combined configuration...


October 12, 2009  6:44 PM

Service Restoration Planning – Part II



Posted by: Robert Davis
Backup Plan, BCP, Business Continuity Plan, Crisis, Disaster, Disaster Recovery Plan, Disruption, DRP, Emergency, Service Restoration Plan, SRP

Business continuity has been generally defined as a comprehensive managed effort to prioritize key business processes identifying significant threats to normal operations that permit planning strategies for ensuring effective and efficient organizational responses to challenges arising during...


October 8, 2009  7:50 PM

Service Restoration Planning – Part I



Posted by: Robert Davis
Backup Plan, BCP, Business Continuity, Crisis, Disaster, Disaster Recovery, Disruption, DRP, Emergency, Service Restoration, SRP

Threats to an entity's existence manifest in diverse forms, including disruptions, emergencies, crises or disasters. Any one of these incidents or events can jeopardize data processing services sustaining mission critical operations. When business integrated information systems are unavailable,...


October 5, 2009  7:45 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part V



Posted by: Robert Davis
Air Flow, Availability, Boards, Cards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

Decreasing computer hardware replacement cost has not eliminated the need for adequate environmental protection. To avoid humidity corruption, information security managers should verify humidity and temperature levels are maintained within the...


October 1, 2009  11:22 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part IV



Posted by: Robert Davis
Air Flow, Availability, Boards, Cards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

IT can, and does, operate within a wide humidity range. Seasonal humidity changes are usually easier to control than hourly fluctuations. Under either circumstance, normally the primary environmental concern is preventing conditions that permit humidity alterations where condensation is the...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: