Managing the Dynamic Uncertainties of IT – Part VI

An adequate IT plan describes predetermined objectives, goals as well as ambit with sufficient supporting detail to guide risk assessment development. Correspondingly, IT risk assessment plans should reflect applicable IT standards and practice statements issued by governing bodies. Whereby,...
Managing the Dynamic Uncertainties of IT – Part V

The IT program’s ambit generally dictates the risk assessment approach. Regarding techniques, the IT program’s ambit determines ‘what’ will be assessed, ‘how’ it will be assessed and assessment limits. Reflective of the IT planning premise, evaluating...
Managing the Dynamic Uncertainties of IT – Part IV

Selecting a discretionary IT risk management framework imposes defining spending limits, work assignments and information decisions for creating and managing a viable strategically aligned IT management plan. ...
Managing the Dynamic Uncertainties of IT – Part III

Managerial monitoring of deployed controls focusing on redressing external and internal environment quality assists in ensuring the established fiduciary relationship with stakeholders is fulfilled. An entity’s control environment quality is a major factor impacting irregular...
Managing the Dynamic Uncertainties of IT – Part II

Risk management should be a continuous, adaptive effort addressing: threats, opportunities, and vulnerabilities. In pursuit of achieving dynamic homeostasis for IT, effective "
Managing the Dynamic Uncertainties of IT – Part I

Most entities operate in an environment that is influenced by perceived stakeholder values; the entity’s mission, vision and values; community and organizational ethics and culture; applicable laws, regulations and policies; as well as industry practices. When interacting with the environment,...
Managing the Growth and Impact of Virtual Machines and Memory – Part VIII

Given the proliferation of available hardware and software products that enable capitalizing on benefits associated with IT virtualization, when IT employees fail to perform effective configuration management; potential threats to the IT architecture are significantly increased. Besides managing...
Managing the Growth and Impact of Virtual Machines and Memory – Part VII

As with any IT architecture item, to address the entity’s processing needs, virtual machines require execution of effective configuration management....
Managing the Growth and Impact of Virtual Machines and Memory – Part VI

Though a process virtual machine can be considered an application-orientated system virtual machine; process virtual machine uniqueness resides in the provisioning of “a platform-independent programming environment...