IT Governance, Risk, and Compliance

Oct 21 2011   8:29PM GMT

Auditing Information Assets Protection – Part I

Robert Davis Robert Davis Profile: Robert Davis

Failure of an entity to take proper safeguarding precautions can lead to major operational problems and substantial asset loss. Incidents recorded throughout the world continuously reiterate that entities should not ignore information assets protection (IAP) risks and the need for processes to ensure IAP requirements and risks are adequately redressed. Information security governance (ISG) is a key element in assisting entities in providing a superior IAP program. Therefore, due to IAP controls usually inscribed within ISG — including identity management, vulnerability management, threat management, and encryption management — this deployable management tool resists dismissal as an inconsequential framework, methodology, or technique.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: