Posted by: Robert Davis
Decision Making, Feedback Control, Fuzzy Logic, Goals, Internal Control Systems, ITG, Linear Control, Logic Control, Management, Monitoring, Objectives, Organizing, Planning, Policy Enforcement, Policy Formation, Sequential Control
Due to the continuous adoption of new or improved hardware, firmware and software, IT threat vectors are likely to remain a business risk for the foreseeable future. Once an entity understands what information needs to be controlled and have developed a set of policies to address data protection, they can evaluate technology solutions enabled to both stop perceived threats and automatically enforce IT policies. Within this context, entities should acquire solutions that enforce IT policies while reducing risk exposure, controlling costs, and simplifying administration across the deployed IT architecture.
“View Part I of the Governing IT: Policy Formulation and Enforcement series here“