Posted by: Robert Davis
Accountability, Acquire and Implement, Adaptive Systems, Asset Management, Assurance Services, Availability Management, COBIT, COBIT Domains, Control Environment, Control Objectives, Control Objectives for Information and related Technology, Deliver and Support, Due Diligence, Fiduciary Responsibility, Framework, Information Assets Protection, Information Security Governance, Information Security Management, ISG, Key Performance Indicators, Monitor and Evaluate, Performance Measurement, Plan and Organize, Risk Management, Strategic Alignment, Value Delivery
Usually, it is easier to purchase an IT solution addressing IAP than to change a culture. However; even the most secure system will not achieve a significant degree of protection if utilized by “ill-informed, untrained, careless or indifferent personnel.” A well-structured information security function, staffed with appropriately qualified individuals, forms the foundation for high-quality performance and is the basis for providing positive IAP assurance to interested parties.
* * * * *
Post Note: Assuring Information Security maybe previewed at the following webpages: