IT Governance, Risk, and Compliance:

IT Security Program

1

April 14, 2009  1:08 AM

Measuring Performance – Part IV



Posted by: Robert Davis
CE, Control Environment, Information Security Governance, Information Security Management, ISSM, IT Security Program, ITSM, Key Performance Indicators, KPI, Safeguarding Investments, Service Delivery and Support, Service Level Agreement, Service Management, SLA

Selective measurement utility is realized when a critical few indicators permit accurate and timely information for decision-making and, by extension, appropriate information assets protection....

April 9, 2009  7:10 PM

Measuring Performance – Part III



Posted by: Robert Davis
CE, Control Environment, Information Security Governance, Information Security Management, ISSM, IT Security Program, ITSM, Key Performance Indicators, KPI, Safeguarding Investments, Service Delivery and Support, Service Level Agreement, Service Management, SLA

IT security maturity modeling can measure the established control environment and controls within processes. Typically, the defined maturity modeling scale addresses entity-centric processes from an ad hoc...


April 6, 2009  8:15 PM

Measuring Performance – Part II



Posted by: Robert Davis
Information Security Governance, Information Security Management, ISSM, IT Security Program, ITSM, Key Performance Indicators, KPI, Safeguarding Investments, Service Delivery and Support, Service Level Agreement, Service Management, SLA

Financially-related information is generated to establish cost-oriented steering towards achieving entity-centric objectives and goals. Generally, aggressive expenses administration and accurate costs redistribution improve financial resources availability. However, the IT security financial...


April 3, 2009  7:22 PM

Measuring Performance – Part I



Posted by: Robert Davis
Information Security Governance, Information Security Management, ISSM, IT Security Program, ITSM, Key Performance Indicators, KPI, Safeguarding Investments, Service Delivery and Support, Service Level Agreement, Service Management, SLA

Though IT security service management can include a plethora of indicators, adequate service value measurement is not demonstrated in the sheer number of indicators considered. Practical IT security service delivery and support utilization...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: