IT Governance, Risk, and Compliance

Jan 19 2013   4:35PM GMT

eBook excerpt: Assuring Information Security – Part XII



Posted by: Robert Davis
Tags:
Accountability
Acquire and Implement
Adaptive Systems
Asset Management
Assurance Services
Availability Management
COBIT
COBIT Domains
Control Environment
Control Objectives
Control Objectives for Information and related Technology
Deliver and Support
Due Diligence
Fiduciary Responsibility
Framework
Information Assets Protection
Information Security Governance
Information Security Management
ISG
Key Performance Indicators
Monitor and Evaluate
Performance Measurement
Plan and Organize
Risk Management
Strategic Alignment
Value Delivery

If management views an IAP program as a methodology for achieving information systems goals and objectives, the adopted processes can enable a series of assessments defining control usefulness and control deployment; while conjunctively correlating effectiveness and efficiency directly linked to managerial and employee responsibility, accountability, and authority. Beneficially, regarding an entity’s direction and purpose; when responsibility, accountability, and authority are properly tailored, communication efficiency is improved through reductions in entropy and misunderstanding. Furthermore, management’s deployed IAP controls monitoring assists in ensuring the established fiduciary relationship with stakeholders is fulfilled. As an entity integrated resource, IT should be deployed as managerially required and with a sufficient level of formality, coverage, and control completeness to allow IAP monitoring.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: