IT Governance, Risk, and Compliance:

Governance Tree


September 10, 2009  9:01 PM

Supporting ISG Deployment – Part III



Posted by: Robert Davis
Framework, Governance Tree, Information Security Governance, Information Security Management, Information Security Processes, Internal Control System, ISG, ISM, ITG, Methodology

Alternatively, if you perceive ISG as a descriptive prescription for achieving managerial objectives, the adopted ISG methodology should provide security assessments defining strategic, tactical, and operational risks. Management usually is...

September 8, 2009  6:56 PM

Supporting ISG Deployment – Part II



Posted by: Robert Davis
Framework, Governance Tree, Information Security Governance, Information Security Management, Information Security Processes, ISG, ISM, ITG, Methodology

If you envision ISG as a framework servicing entity and 'IT governance', then structurally, ISG should be implemented as an organizational program with objectives,...


September 3, 2009  8:04 PM

Supporting ISG Deployment – Part I



Posted by: Robert Davis
Framework, Governance Tree, Information Security Governance, Information Security Management, Information Security Processes, ISG, ISM, ITG, Methodology

Traversing to and aligning with potential 'Governance Tree' third-tier abstraction levels; information security governance (ISG) can be viewed as a framework, methodology, or technique. Framing ISG enables a...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: