IT Governance, Risk, and Compliance:

ISG


September 3, 2009  8:04 PM

Supporting ISG Deployment – Part I



Posted by: Robert Davis
Framework, Governance Tree, Information Security Governance, Information Security Management, Information Security Processes, ISG, ISM, ITG, Methodology

Traversing to and aligning with potential 'Governance Tree' third-tier abstraction levels; information security governance (ISG) can be viewed as a framework, methodology, or technique. Framing ISG enables a...

June 9, 2009  9:33 PM

Digital Rights Management – Part IV



Posted by: Robert Davis
DRM, IAP, Information Asset Protection, Information Security Governance, Intellectual Property Right, Internet, Internet Governance, IPR, ISG, Trust Management, WIPO, World Intellectual Property Organization, World Trade Organization, WTO

IPR protection requirements shape complex and challenging management issues. Audio and visual material protection is especially problematic due to the existence of the various known vulnerabilities, and...


June 5, 2009  8:40 PM

Digital Rights Management – Part III



Posted by: Robert Davis
DRM, IAP, Information Asset Protection, Information Security Governance, Intellectual Property Right, Internet, Internet Governance, IPR, ISG, Trust Management, WIPO, World Intellectual Property Organization, World Trade Organization, WTO

DRM software is generally considered an access control technology deployed to limit unauthorized usage. However, arguably, a technology cannot in principle, know what legal restrictions and rights apply in...


June 2, 2009  3:44 PM

Digital Rights Management – Part II



Posted by: Robert Davis
IAP, Information Asset Protection, Information Security Governance, Intellectual Property Right, Internet, Internet Governance, IPR, ISG, Trust Management, WIPO, World Intellectual Property Organization, World Trade Organization, WTO

Intellectual property protection has ushered in an era of technological solutions that attempt to prevent asserted rights infringement. Digital Rights Management (DRM) can be considered a response to legal requirements which criminalize the...


May 29, 2009  7:40 PM

Digital Rights Management – Part I



Posted by: Robert Davis
IAP, Information Asset Protection, Information Security Governance, Intellectual Property Right, Internet, Internet Governance, IPR, ISG, Trust Management

Intellectual property right (IPR) issues affect Information Security Governance as well as Internet Governance deployments through a direct impact on '


May 12, 2009  3:25 PM

Developing Objectives – Part IV



Posted by: Robert Davis
Accountability, Behavioral Management, Benchmarking, Goals, IAP, Information Asset Protection, Information Security Governance, Information Security Management, ISG, ISM, Management by Objectives, MBO, Planning Committee, Resource Allocation, Responsibility

MBO is a participative behavioral approach to managing employees. One of the primary MBO assumptions is that employees prefer to work hard once they are provided with employer expectations. Intuitively, sustaining accepted expectations...


May 7, 2009  11:14 PM

Developing Objectives – Part III



Posted by: Robert Davis
Accountability, Behavioral Management, Benchmarking, Goals, IAP, Information Asset Protection, Information Security Governance, Information Security Management, ISG, ISM, Management by Objectives, MBO, Planning Committee, Resource Allocation, Responsibility

A system for disseminating information security management objectives is considered fundamental to obtain employee commitment. One way to communicate entity-centric information security objectives is clear and concise policies. Information security...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


May 4, 2009  6:32 PM

Developing Objectives – Part II



Posted by: Robert Davis
Accountability, Behavioral Management, Benchmarking, Goals, IAP, Information Asset Protection, Information Security Governance, Information Security Management, ISG, ISM, Management by Objectives, MBO, Planning Committee, Resource Allocation, Responsibility

Within behavioral management theory, entity leaders have alternative approaches available to accomplish information assets safeguarding objectives development -- including participative, consultative, free rein, and autocratic models....


April 27, 2009  6:25 PM

Measuring Delivery Value – Part IV



Posted by: Robert Davis
Continuous Process Improvement, CPI, Information Security Governance, Information Security Infrastructure Management, Information Security Processes, Information Security Service Management, ISG, ISIM, ISSM, IT Security Infrastructure, IT Security Services, Key Performance Indicators, KPI, Performance Measurement, Safeguarding Investments

Performance measurement is a control activity. Measurement techniques are the means for effective information security performance monitoring. "Selective measurement utility is realized when a critical few indicators permit accurate and timely information for decision-making and, by extension,...


April 23, 2009  6:41 PM

Measuring Delivery Value – Part III



Posted by: Robert Davis
Continuous Process Improvement, CPI, Information Security Governance, Information Security Infrastructure Management, Information Security Processes, Information Security Service Management, ISG, ISIM, ISSM, IT Security Infrastructure, IT Security Services, Performance Measurement, Safeguarding Investments

Information security service management can include financial and non-financial indicators to enable performance assessments. However, selected indicators must represent a mathematically measurable quality. An adopted KPI should have an...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: