IT Governance, Risk, and Compliance:

Information Security Governance


April 27, 2009  6:25 PM

Measuring Delivery Value – Part IV



Posted by: Robert Davis
Continuous Process Improvement, CPI, Information Security Governance, Information Security Infrastructure Management, Information Security Processes, Information Security Service Management, ISG, ISIM, ISSM, IT Security Infrastructure, IT Security Services, Key Performance Indicators, KPI, Performance Measurement, Safeguarding Investments

Performance measurement is a control activity. Measurement techniques are the means for effective information security performance monitoring. "Selective measurement utility is realized when a critical few indicators permit accurate and timely information for decision-making and, by extension,...

April 23, 2009  6:41 PM

Measuring Delivery Value – Part III



Posted by: Robert Davis
Continuous Process Improvement, CPI, Information Security Governance, Information Security Infrastructure Management, Information Security Processes, Information Security Service Management, ISG, ISIM, ISSM, IT Security Infrastructure, IT Security Services, Performance Measurement, Safeguarding Investments

Information security service management can include financial and non-financial indicators to enable performance assessments. However, selected indicators must represent a mathematically measurable quality. An adopted KPI should have an...


April 20, 2009  7:42 PM

Measuring Delivery Value – Part II



Posted by: Robert Davis
Continuous Process Improvement, CPI, Information Security Governance, Information Security Infrastructure Management, Information Security Processes, Information Security Service Management, ISG, ISIM, ISSM, IT Security Infrastructure, IT Security Services, Safeguarding Investments

Procedurally, once information security management has analyzed the entity-centric mission, identified stakeholders, and defined objectives; goals must be established with appropriate performance indicators for status assessments. "Practical information security service delivery and support...


April 17, 2009  5:56 PM

Measuring Delivery Value – Part I



Posted by: Robert Davis
Continuous Process Improvement, CPI, Information Security Governance, Information Security Infrastructure Management, Information Security Processes, Information Security Service Management, ISG, ISIM, ISSM, IT Security Infrastructure, IT Security Services

Considering adamant demands for continuous process improvements, focus on overall information protection and delivery value in terms of enabled services has become a managerial necessity. Information Security Service Management is a set of...


April 14, 2009  1:08 AM

Measuring Performance – Part IV



Posted by: Robert Davis
CE, Control Environment, Information Security Governance, Information Security Management, ISSM, IT Security Program, ITSM, Key Performance Indicators, KPI, Safeguarding Investments, Service Delivery and Support, Service Level Agreement, Service Management, SLA

Selective measurement utility is realized when a critical few indicators permit accurate and timely information for decision-making and, by extension, appropriate information assets protection....


April 9, 2009  7:10 PM

Measuring Performance – Part III



Posted by: Robert Davis
CE, Control Environment, Information Security Governance, Information Security Management, ISSM, IT Security Program, ITSM, Key Performance Indicators, KPI, Safeguarding Investments, Service Delivery and Support, Service Level Agreement, Service Management, SLA

IT security maturity modeling can measure the established control environment and controls within processes. Typically, the defined maturity modeling scale addresses entity-centric processes from an ad hoc...


April 6, 2009  8:15 PM

Measuring Performance – Part II



Posted by: Robert Davis
Information Security Governance, Information Security Management, ISSM, IT Security Program, ITSM, Key Performance Indicators, KPI, Safeguarding Investments, Service Delivery and Support, Service Level Agreement, Service Management, SLA

Financially-related information is generated to establish cost-oriented steering towards achieving entity-centric objectives and goals. Generally, aggressive expenses administration and accurate costs redistribution improve financial resources availability. However, the IT security financial...


April 3, 2009  7:22 PM

Measuring Performance – Part I



Posted by: Robert Davis
Information Security Governance, Information Security Management, ISSM, IT Security Program, ITSM, Key Performance Indicators, KPI, Safeguarding Investments, Service Delivery and Support, Service Level Agreement, Service Management, SLA

Though IT security service management can include a plethora of indicators, adequate service value measurement is not demonstrated in the sheer number of indicators considered. Practical IT security service delivery and support utilization...


February 23, 2009  9:26 PM

Legal Compliance Alignment – Part IV



Posted by: Robert Davis
FCPA, Foreign Corrupt Practices Act, GLBA, Gramm-Leach-Bliley Act, Health Insurance Portability and Accountability Act, HIPAA, IAP, Information Asset Protection, Information Security Governance, Information Security Management, ISG, ISM, Sarbanes Oxley Act, SOA, SOX

When exploring links between national and international arenas, the information security manager will discover international developments decisively impact national laws. Specifically, regional coalitions have enacted IAP related edicts that subsequently were codified in national laws and...


February 19, 2009  8:47 PM

Legal Compliance Alignment – Part III



Posted by: Robert Davis
FCPA, Foreign Corrupt Practices Act, GLBA, Gramm-Leach-Bliley Act, Health Insurance Portability and Accountability Act, HIPAA, IAP, Information Asset Protection, Information Security Governance, Information Security Management, ISG, ISM, Sarbanes Oxley Act, SOA, SOX

There are numerous global, regional as well as national laws and regulations focusing on information assets protection (IAP) requiring professional consideration. In particular, at...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: