IT Governance, Risk, and Compliance:

Monitor and Evaluate


December 27, 2012  1:31 AM

eBook excerpt: Assuring Information Security – Part V



Posted by: Robert Davis
Accountability, Acquire and Implement, Adaptive Systems, Asset Management, Availability Management, COBIT, COBIT Domains, Control Environment, Control Objectives for Information and related Technology, Deliver and Support, Due Diligence, Fiduciary Responsibility, Framework, Information Assets Protection, Information Security Governance, Information Security Management, ISG, Key Performance Indicators, Monitor and Evaluate, Performance Measurement, Plan and Organize, Risk Management, Security Frameworks, Strategic Alignment, Value Delivery

1.1 Control Environment

“…culture determines the behaviour of people in an organisation and should, therefore, be used to influence the behaviour of people with regard to information security.” – Kerry-Lynn Thomson and Rossouw von...

December 22, 2012  1:43 AM

eBook excerpt: Assuring Information Security – Part IV



Posted by: Robert Davis
Accountability, Acquire and Implement, Asset Management, Availability Management, COBIT Domains, Control Objectives for Information and related Technology, Deliver and Support, Due Diligence, Fiduciary Responsibility, Framework, Information Assets Protection, Information Security Governance, Information Security Management, ISG, Key Performance Indicators, Monitor and Evaluate, Plan and Organize, Risk Management, Value Delivery

Usually, a formal ISG program is required to promote information assets safeguarding.  ISG programs should ensure the Control Objectives for Information and related Technology (COBIT) framework confidentiality, integrity, availability, compliance, and reliability information criteria are not...


December 20, 2012  2:52 AM

eBook excerpt: Assuring Information Security – Part III



Posted by: Robert Davis
Accountability, Acquire and Implement, Asset Management, Availability Management, COBIT Domains, Control Objectives for Information and related Technology, Deliver and Support, Due Diligence, Fiduciary Responsibility, Framework, Information Assets Protection, Information Security Governance, Information Security Management, ISG, Key Performance Indicators, Monitor and Evaluate, Plan and Organize, Risk Management, Value Delivery

Acquisitions and implementations are necessary for adequate information security.  To realize the information security strategy, information security solutions need to be identified, developed or acquired, as well as implemented and integrated into business and IT processes seamlessly.  During an...


December 15, 2012  12:05 AM

eBook excerpt: Assuring Information Security – Part II



Posted by: Robert Davis
Accountability, Acquire and Implement, Asset Management, Availability Management, COBIT Domains, Control Objectives for Information and related Technology, Deliver and Support, Due Diligence, Fiduciary Responsibility, Framework, Information Assets Protection, Information Security Governance, Information Security Management, ISG, Key Performance Indicators, Monitor and Evaluate, Plan and Organize, Risk Management, Security Frameworks, Value Delivery

Instituting and/or sustaining ISG requires comprehensive planning and organizing; robust acquisitions and implementations; effective delivery and support; as well as continuous monitoring and evaluation to address the myriad of managerial, operational, and technical issues that can thwart...


December 13, 2012  1:52 AM

eBook excerpt: Assuring Information Security – Part I



Posted by: Robert Davis
Accountability, Acquire and Implement, Asset Management, Availability Management, COBIT Domains, Continuity Management, Control Objectives for Information and related Technology, Deliver and Support, Due Diligence, Fiduciary Responsibility, Framework, Information Assets Protection, Information Security Governance, Information Security Management, ISG, Key Performance Indicators, Monitor and Evaluate, Performance Measurement, Plan and Organize, Risk Management, Security Frameworks, Strategic Alignment, Value Delivery

Chapter 1: Information Security Governance

“The information possessed by an organization is among its most valuable assets and is critical to its success.  The Board of Directors, which is ultimately accountable for the organization’s success, is therefore...


February 8, 2011  9:21 PM

Governing IT: Setting Control Objectives – Part VIII



Posted by: Robert Davis
Acquire and Implement, Availability, COBIT Domains, Confidentiality, Control Objectives, Deliver and Support, Effectiveness, Efficiency, Integrity, MIS, Monitor and Evaluate, Plan and Organize, Planning Committee, Reliability, Risk Management

IT goals election as well as information systems design, implementation, and maintenance are bound by IT objectives. Performing an IT maturity assessment can assist in determining where improvements are most needed. Subsequently, IT control objectives selection conveys what is considered...


February 4, 2011  11:07 PM

Governing IT: Setting Control Objectives – Part VII



Posted by: Robert Davis
Acquire and Implement, Availability, COBIT Domains, Confidentiality, Control Objectives, Deliver and Support, Effectiveness, Efficiency, Integrity, MIS, Monitor and Evaluate, Plan and Organize, Planning Committee, Reliability, Risk Management

“An [entity's] Management Information System...


February 1, 2011  9:04 PM

Governing IT: Setting Control Objectives – Part VI



Posted by: Robert Davis
Acquire and Implement, Availability, COBIT Domains, Confidentiality, Control Objectives, Deliver and Support, Effectiveness, Efficiency, Integrity, Monitor and Evaluate, Plan and Organize, Planning Committee, Reliability, Risk Management

Reflective of ensuring effective IT control objectives, undertaking IT risk management provides the framework that enables future activity to take place in a consistent and controlled manner. ...


January 28, 2011  10:07 PM

Governing IT: Setting Control Objectives – Part V



Posted by: Robert Davis
Acquire and Implement, Availability, COBIT Domains, Confidentiality, Control Objectives, Deliver and Support, Effectiveness, Efficiency, Integrity, Monitor and Evaluate, Plan and Organize, Planning Committee, Reliability

Using SWOT, each IT objectives analysis team member should have conversations with at least four other individuals from the entity to solicit their situational assessment of the current state of IT controls. At a minimum, the four individuals -- queried independently by each team member involved...


January 25, 2011  9:53 PM

Governing IT: Setting Control Objectives – Part IV



Posted by: Robert Davis
Acquire and Implement, Availability, COBIT Domains, Confidentiality, Control Objectives, Deliver and Support, Effectiveness, Efficiency, Integrity, Monitor and Evaluate, Plan and Organize, Planning Committee, Reliability

COBIT enables an entity to set clear control objectives for IT through the combining of previously discussed individual IT design and operational areas. Specifically, the eight IT managerial areas are grouped into four...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: