IT Governance, Risk, and Compliance

Nov 16 2009   8:13PM GMT

Second-Tier Governance Deployment – Part IV



Posted by: Robert Davis
Tags:
CISA
CISM
Concentrator
Decision Theory
Fiduciary Responsibility
Framework
Governance Tree
Information Security Governance
Information Security Management
Information Theory
ISG
ISM
Multiplexor
Node
Stakeholder

Abstraction levels are developed based on perceived usefulness. Second-tier Governance Tree information nodes can be viewed in the context of programs, systems, and processes. Pragmatically, establishment of entity-level governance is a second-tier concentrator within the Governance Tree model that focuses on creating an adequate control environment, institutionalizing risk assessments, providing fluid information and communication, ensuring performance monitoring and evaluation, as well as designing and implementing necessary activities. Governance Tree understanding enables abstraction for superior information security program deployment.

View Part I of the Second-Tier Governance Development series here

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: