IT Governance, Risk, and Compliance

Jan 8 2011   12:26AM GMT

Governing IT: Policy Formulation and Enforcement – Part VII

Posted by: Robert Davis
Decision Making
Feedback Control
Fuzzy Logic
Internal Control Systems
Linear Control
Logic Control
Policy Enforcement
Policy Formation
Sequential Control

Due to the continuous adoption of new or improved hardware, firmware and software, IT threat vectors are likely to remain a business risk for the foreseeable future. Once an entity understands what information needs to be controlled and have developed a set of policies to address data protection, they can evaluate technology solutions enabled to both stop perceived threats and automatically enforce IT policies. Within this context, entities should acquire solutions that enforce IT policies while reducing risk exposure, controlling costs, and simplifying administration across the deployed IT architecture.

View Part I of the Governing IT: Policy Formulation and Enforcement series here

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: