IT Governance, Risk, and Compliance:

November, 2009

1

November 30, 2009  7:22 PM

Safeguarding Assets is an IT Project Management Issue – Part III



Posted by: Robert Davis
Applications, Asset, IDLC, Implementation, Information Technology, Infrastructure, Infrastructure Development Life Cycle, IT, Project Management, Risk Management, SDLC, System Development Life Cycle, Systems Analysis, Systems Design, Value Delivery

An adequate IT infrastructure permits the continuance and growth of technology-based systems. Considering the Control Objectives for Information and related Technology (

November 25, 2009  7:59 PM

Safeguarding Assets is an IT Project Management Issue – Part II



Posted by: Robert Davis
Applications, Asset, Implementation, Information System, Information Technology, Infrastructure, IT, Project Management, Risk Management, SDLC, System Development Life Cycle, Systems Analysis, Systems Design, Value Delivery

As a foundational definition; a system is an assembly of procedures, processes, methods, and/or techniques united by regulated interaction conventions to form an organized whole in support of the entity’s objectives. A key term to this definition is “


November 23, 2009  6:26 PM

Safeguarding Assets is an IT Project Management Issue – Part I



Posted by: Robert Davis
Applications, Asset, Implementation, Information Technology, Infrastructure, IT, Project Management, Risk Management

Technology-based systems and infrastructure do not occur accidentally. They come into being only after appropriate planning, comprehensive...


November 19, 2009  9:16 PM

Second-Tier Governance Deployment – Part V



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, ITGI, Node, Safeguarding, Stakeholder

Governance usually occurs at different organizational strata, with procedures tailored for processes, with processes linking up to systems, and programs receiving objectives from the entity's oversight committee through established...


November 16, 2009  8:13 PM

Second-Tier Governance Deployment – Part IV



Posted by: Robert Davis
CISA, CISM, Concentrator, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Multiplexor, Node, Stakeholder

Abstraction levels are developed based on perceived usefulness. Second-tier Governance Tree information nodes can be viewed in the context of programs, systems, and processes. Pragmatically, establishment of entity-level governance is a second-tier


November 12, 2009  9:10 PM

Second-Tier Governance Deployment – Part III



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Entity tonal and nodal associations create powerful decision making structures that enable achieving objectives and goals. Information is generally considered the primal basis for decision making. However, to affect decision making information must be communicated through an acceptable medium....


November 9, 2009  6:34 PM

Second-Tier Governance Deployment – Part II



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Governance definitional phrases typically embrace language explaining relationships and incentives among 'oversight committee' members, senior executives, and 'stakeholders' resulting in...


November 5, 2009  7:43 PM

Second-Tier Governance Deployment – Part I



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Governing an entity mandates management accurately conceptualize organizational development, information criticality, and communication paths. For-profit entities are formulated to generate tangible and intangible wealth for stakeholders,...


November 2, 2009  5:34 PM

First-Tier Governance Development – Part IV



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Organizational units exist for various reasons. Threading from the first-tier Governance Tree level, linked leaves are inextricably affected by external forces. An organizational formation's continuity depends on relevant, accurate and timely external environment information assessments to drive...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: