IT Governance, Risk, and Compliance:

Information Security Management


August 12, 2011  8:31 PM

An Overview of IT Service Delivery and Support – Part V



Posted by: Robert Davis
Asset Management, Availability Management, Capacity Management, Change Management, Configuration Management, Continuity Management, Financial Management, IEC, Information Security Management, ISO, Service Level Management

With IT applications attempting to support every possible organizational structure and business process, operational simplicity can proportionally diminish or vanish for users. Despite transparency provisions through graphical user interfaces, color diversity and help messages; IT complexity can...

August 9, 2011  7:54 PM

An Overview of IT Service Delivery and Support – Part IV



Posted by: Robert Davis
Asset Management, Availability Management, Capacity Management, Change Management, Configuration Management, Continuity Management, Financial Management, IEC, Information Security Management, ISO, Service Level Management

Considering information systems are generally critical to enhancing productivity, it is imperative deployed IT provide availability with service responsiveness meeting user utilization demands. Entity intricacies and IT operational complexities can result in issues that may necessitate speedy and...


August 5, 2011  8:00 PM

An Overview of IT Service Delivery and Support – Part III



Posted by: Robert Davis
Asset Management, Availability Management, Capacity Management, Change Management, Configuration Management, Continuity Management, Financial Management, IEC, Information Security Management, ISO, Service Level Management

IT management should pursue satisfactorily serving its customers to enhance information asset value perceptions. For most entity users, IT is a tool to perform routine business processes. As examples, potential IT usage can encompass: transferring or collecting financial instruments, receiving...


August 2, 2011  8:21 PM

An Overview of IT Service Delivery and Support – Part II



Posted by: Robert Davis
Asset Management, Availability Management, Capacity Management, Change Management, Configuration Management, Continuity Management, Financial Management, IEC, Information Security Management, ISO, Service Level Management

In order to deliver adequate IT services, the necessary support processes must be established and functioning consistent with entity-centric service requirements. Abstractively; asset management, configuration management as well as change...


July 29, 2011  8:34 PM

An Overview of IT Service Delivery and Support – Part I



Posted by: Robert Davis
Availability Management, Capacity Management, Continuity Management, IEC, Information Security Management, ISO, Service Level Management

IT service delivery and support is an activity hive requiring appropriate resource allocations to satisfy managerial agreements and expectations. Within this context, the success of IT commonly depends upon the extent to which its services satisfy customer initial requirements and requested...


November 19, 2009  9:16 PM

Second-Tier Governance Deployment – Part V



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, ITGI, Node, Safeguarding, Stakeholder

Governance usually occurs at different organizational strata, with procedures tailored for processes, with processes linking up to systems, and programs receiving objectives from the entity's oversight committee through established...


November 16, 2009  8:13 PM

Second-Tier Governance Deployment – Part IV



Posted by: Robert Davis
CISA, CISM, Concentrator, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Multiplexor, Node, Stakeholder

Abstraction levels are developed based on perceived usefulness. Second-tier Governance Tree information nodes can be viewed in the context of programs, systems, and processes. Pragmatically, establishment of entity-level governance is a second-tier


November 12, 2009  9:10 PM

Second-Tier Governance Deployment – Part III



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Entity tonal and nodal associations create powerful decision making structures that enable achieving objectives and goals. Information is generally considered the primal basis for decision making. However, to affect decision making information must be communicated through an acceptable medium....


November 9, 2009  6:34 PM

Second-Tier Governance Deployment – Part II



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Governance definitional phrases typically embrace language explaining relationships and incentives among 'oversight committee' members, senior executives, and 'stakeholders' resulting in...


November 5, 2009  7:43 PM

Second-Tier Governance Deployment – Part I



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Governing an entity mandates management accurately conceptualize organizational development, information criticality, and communication paths. For-profit entities are formulated to generate tangible and intangible wealth for stakeholders,...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: