IT Governance, Risk, and Compliance

Mar 19 2009   7:56PM GMT

Control Assessments – Part I

Robert Davis Robert Davis Profile: Robert Davis

For most entities, information and related technologies compliance management is critical to survival as well as success. As with other organizational programs, security compliance does not occur through managerial intent transmissions from a remote planet in some distant galaxy far, far away. Typically, an entity’s oversight committee and subordinate management periodically evaluate the effectiveness of an information assets protection (IAP) program’s responsiveness to recommendations, control and monitoring activities as well as the ability to prevent or detect irregular and illegal acts. Consequently, information security managers should continually seek to improve IAP controls.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: