IT Governance, Risk, and Compliance

Jan 31 2013   2:33AM GMT

eBook excerpt: Assuring Information Security – Part XV

Posted by: Robert Davis
Acquire and Implement
Adaptive Systems
Asset Management
Assurance Services
Availability Management
COBIT Domains
Control Environment
Control Objectives
Control Objectives for Information and related Technology
Deliver and Support
Due Diligence
Fiduciary Responsibility
Information Assets Protection
Information Security Governance
Information Security Management
Key Performance Indicators
Monitor and Evaluate
Performance Measurement
Plan and Organize
Risk Management
Strategic Alignment
Value Delivery

Usually, it is easier to purchase an IT solution addressing IAP than to change a culture.  However; even the most secure system will not achieve a significant degree of protection if utilized by “ill-informed, untrained, careless or indifferent personnel.”  A well-structured information security function, staffed with appropriately qualified individuals, forms the foundation for high-quality performance and is the basis for providing positive IAP assurance to interested parties.

* * * * *

Post Note: Assuring Information Security maybe previewed at the following webpages:

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: