IT Governance, Risk, and Compliance:

Key Performance Indicators


December 27, 2012  1:31 AM

eBook excerpt: Assuring Information Security – Part V



Posted by: Robert Davis
Accountability, Acquire and Implement, Adaptive Systems, Asset Management, Availability Management, COBIT, COBIT Domains, Control Environment, Control Objectives for Information and related Technology, Deliver and Support, Due Diligence, Fiduciary Responsibility, Framework, Information Assets Protection, Information Security Governance, Information Security Management, ISG, Key Performance Indicators, Monitor and Evaluate, Performance Measurement, Plan and Organize, Risk Management, Security Frameworks, Strategic Alignment, Value Delivery

1.1 Control Environment

“…culture determines the behaviour of people in an organisation and should, therefore, be used to influence the behaviour of people with regard to information security.” – Kerry-Lynn Thomson and Rossouw von...

December 22, 2012  1:43 AM

eBook excerpt: Assuring Information Security – Part IV



Posted by: Robert Davis
Accountability, Acquire and Implement, Asset Management, Availability Management, COBIT Domains, Control Objectives for Information and related Technology, Deliver and Support, Due Diligence, Fiduciary Responsibility, Framework, Information Assets Protection, Information Security Governance, Information Security Management, ISG, Key Performance Indicators, Monitor and Evaluate, Plan and Organize, Risk Management, Value Delivery

Usually, a formal ISG program is required to promote information assets safeguarding.  ISG programs should ensure the Control Objectives for Information and related Technology (COBIT) framework confidentiality, integrity, availability, compliance, and reliability information criteria are not...


December 20, 2012  2:52 AM

eBook excerpt: Assuring Information Security – Part III



Posted by: Robert Davis
Accountability, Acquire and Implement, Asset Management, Availability Management, COBIT Domains, Control Objectives for Information and related Technology, Deliver and Support, Due Diligence, Fiduciary Responsibility, Framework, Information Assets Protection, Information Security Governance, Information Security Management, ISG, Key Performance Indicators, Monitor and Evaluate, Plan and Organize, Risk Management, Value Delivery

Acquisitions and implementations are necessary for adequate information security.  To realize the information security strategy, information security solutions need to be identified, developed or acquired, as well as implemented and integrated into business and IT processes seamlessly.  During an...


December 15, 2012  12:05 AM

eBook excerpt: Assuring Information Security – Part II



Posted by: Robert Davis
Accountability, Acquire and Implement, Asset Management, Availability Management, COBIT Domains, Control Objectives for Information and related Technology, Deliver and Support, Due Diligence, Fiduciary Responsibility, Framework, Information Assets Protection, Information Security Governance, Information Security Management, ISG, Key Performance Indicators, Monitor and Evaluate, Plan and Organize, Risk Management, Security Frameworks, Value Delivery

Instituting and/or sustaining ISG requires comprehensive planning and organizing; robust acquisitions and implementations; effective delivery and support; as well as continuous monitoring and evaluation to address the myriad of managerial, operational, and technical issues that can thwart...


December 13, 2012  1:52 AM

eBook excerpt: Assuring Information Security – Part I



Posted by: Robert Davis
Accountability, Acquire and Implement, Asset Management, Availability Management, COBIT Domains, Continuity Management, Control Objectives for Information and related Technology, Deliver and Support, Due Diligence, Fiduciary Responsibility, Framework, Information Assets Protection, Information Security Governance, Information Security Management, ISG, Key Performance Indicators, Monitor and Evaluate, Performance Measurement, Plan and Organize, Risk Management, Security Frameworks, Strategic Alignment, Value Delivery

Chapter 1: Information Security Governance

“The information possessed by an organization is among its most valuable assets and is critical to its success.  The Board of Directors, which is ultimately accountable for the organization’s success, is therefore...


November 16, 2010  12:03 AM

Service Level Management of Cloud Computing – Part VIII



Posted by: Robert Davis
Cloud Computing, Critical Success Factors, CSF, IT Service Delivery, IT Support, ITSM, Key Performance Indicators, KPI, OLA, Operational Level Agreement, QoS, Quality of Service, Service Level Agreement, Service Level Management, Service Level Requirements, SLA, SLM, SLR

Generally, cloud computing clients do not own the physical infrastructure, logical infrastructure or applications accessed by authorized personnel. Instead, clients avoid capital expenditures through leasing usage from...


November 12, 2010  4:52 AM

Service Level Management of Cloud Computing – Part VII



Posted by: Robert Davis
Cloud Computing, Critical Success Factors, CSF, IT Service Delivery, IT Support, ITSM, Key Performance Indicators, KPI, OLA, Operational Level Agreement, QoS, Quality of Service, Service Level Agreement, Service Level Management, Service Level Requirements, SLA, SLM, SLR

Commercial cloud computing vendors are expected to meet achievable QoS requirements, and if the entity is vigilant, sign legally binding SLAs promoting expectation fulfillment. To ensure effective SLAs, OLAs must be defined and developed prior to deploying any cloud computing...


November 8, 2010  8:32 PM

Service Level Management of Cloud Computing – Part VI



Posted by: Robert Davis
Cloud Computing, Critical Success Factors, CSF, IT Service Delivery, IT Support, ITSM, Key Performance Indicators, KPI, OLA, Operational Level Agreement, QoS, Quality of Service, Service Level Agreement, Service Level Management, Service Level Requirements, SLA, SLM, SLR

SLR recording dictates identifying performance as well as capacity requirements and placing them in a SLM registry. These SLRs can encompass:

  • Scalability...


November 4, 2010  5:13 PM

Service Level Management of Cloud Computing – Part V



Posted by: Robert Davis
Cloud Computing, Critical Success Factors, CSF, IT Service Delivery, IT Support, ITSM, Key Performance Indicators, KPI, OLA, Operational Level Agreement, QoS, Quality of Service, Service Level Agreement, Service Level Management, Service Level Requirements, SLA, SLM, SLR

To enable SLM, customers as well as internal and external suppliers should be identified and managed. For most service providers, cloud computing infrastructure consists of services delivered through central sites utilizing configured...


November 1, 2010  5:39 PM

Service Level Management of Cloud Computing – Part IV



Posted by: Robert Davis
Cloud Computing, Critical Success Factors, CSF, IT Service Delivery, IT Support, ITSM, Key Performance Indicators, KPI, QoS, Quality of Service, Service Level Agreement, Service Level Management, SLA, SLM

SLM can be considered QoS monitoring and management based on key performance indicators (KPIs). QoS KPIs can range from generic...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: