IT Governance, Risk, and Compliance:

Information Security Service Management

1

July 26, 2011  8:04 PM

Business Continuity and IT Availability – Part VIII



Posted by: Robert Davis
Backup, BCM, BCP, Business Continuity, Crisis Management, Disaster Recovery, DRP, Information Security Governance, Information Security Service Management, Information Technology Service Management, ISG, ISSM, ITSM, Service Delivery, Service Disruption, Threat Management

Directly, an entity’s DRP has a significant affect on the viability of IT and information security governance programs. Indirectly, IT and information security governance programs may impact stakeholder assessed entity value. Regardless of organizational formation -- corporation, partnership,...

July 22, 2011  5:35 PM

Business Continuity and IT Availability – Part VII



Posted by: Robert Davis
Backup, BCM, BCP, Business Continuity, Crisis Management, Disaster Recovery, DRP, Information Security Governance, Information Security Service Management, Information Technology Service Management, ISG, ISSM, ITSM, Service Delivery, Service Disruption, Threat Management

Through establishment and deployment of an emergency management program, top-level personnel can send a clear message to everyone in the entity that business continuity and disaster recovery control...


July 19, 2011  8:04 PM

Business Continuity and IT Availability – Part VI



Posted by: Robert Davis
Backup, BCM, BCP, Business Continuity, Crisis Management, Disaster Recovery, DRP, Information Security Governance, Information Security Service Management, Information Technology Service Management, ISG, ISSM, ITSM, Service Delivery, Service Disruption, Threat Management

Considering the interconnectivity of national economies through computer networks, entities are more vulnerable than ever to the possibility of technical difficulties disrupting business at any point in the communication chain. From flood or fire to computer-virus or denial-of-service, disasters...


July 15, 2011  2:44 AM

Business Continuity and IT Availability – Part V



Posted by: Robert Davis
Backup, BCM, BCP, Business Continuity, Crisis Management, Disaster Recovery, DRP, Information Security Governance, Information Security Service Management, Information Technology Service Management, ISG, ISSM, ITSM, Service Delivery, Service Disruption, Threat Management

Managerial concerns normally include: excessive business costs, forgone business opportunities, and potential revenue losses. When a business interruption occurs, restored information assets may affect operational effectiveness and efficiency. ...


July 12, 2011  9:32 PM

Business Continuity and IT Availability – Part IV



Posted by: Robert Davis
Backup, BCM, BCP, Business Continuity, Crisis Management, Disaster Recovery, DRP, Information Security Governance, Information Security Service Management, Information Technology Service Management, ISG, ISSM, ITSM, Service Delivery, Service Disruption, Threat Management

Where accepted as a managerial responsibility, an adequate ISG program should have security professionals participating in system life cycle design, acquisition, testing, and maintenance phases to ensure business continuity as well as availability requirements are appropriately incorporated, that...


April 27, 2009  6:25 PM

Measuring Delivery Value – Part IV



Posted by: Robert Davis
Continuous Process Improvement, CPI, Information Security Governance, Information Security Infrastructure Management, Information Security Processes, Information Security Service Management, ISG, ISIM, ISSM, IT Security Infrastructure, IT Security Services, Key Performance Indicators, KPI, Performance Measurement, Safeguarding Investments

Performance measurement is a control activity. Measurement techniques are the means for effective information security performance monitoring. "Selective measurement utility is realized when a critical few indicators permit accurate and timely information for decision-making and, by extension,...


April 23, 2009  6:41 PM

Measuring Delivery Value – Part III



Posted by: Robert Davis
Continuous Process Improvement, CPI, Information Security Governance, Information Security Infrastructure Management, Information Security Processes, Information Security Service Management, ISG, ISIM, ISSM, IT Security Infrastructure, IT Security Services, Performance Measurement, Safeguarding Investments

Information security service management can include financial and non-financial indicators to enable performance assessments. However, selected indicators must represent a mathematically measurable quality. An adopted KPI should have an...


April 20, 2009  7:42 PM

Measuring Delivery Value – Part II



Posted by: Robert Davis
Continuous Process Improvement, CPI, Information Security Governance, Information Security Infrastructure Management, Information Security Processes, Information Security Service Management, ISG, ISIM, ISSM, IT Security Infrastructure, IT Security Services, Safeguarding Investments

Procedurally, once information security management has analyzed the entity-centric mission, identified stakeholders, and defined objectives; goals must be established with appropriate performance indicators for status assessments. "Practical information security service delivery and support...


April 17, 2009  5:56 PM

Measuring Delivery Value – Part I



Posted by: Robert Davis
Continuous Process Improvement, CPI, Information Security Governance, Information Security Infrastructure Management, Information Security Processes, Information Security Service Management, ISG, ISIM, ISSM, IT Security Infrastructure, IT Security Services

Considering adamant demands for continuous process improvements, focus on overall information protection and delivery value in terms of enabled services has become a managerial necessity. Information Security Service Management is a set of...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: