Search results

Jump to navigation Jump to search
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)
  • '''PO 9.1 IT and Business Risk Management Alignment'''<br> ...amework. This includes alignment with the organization’s risk appetite and risk tolerance level.<br> ...
    3 KB (377 words) - 14:10, 8 August 2006
  • '''PO 9.2 Establishment of Risk Context'''<br> ...comes. This includes determining the internal and external context of each risk assessment, the goal of the assessment and the criteria against which risks ...
    2 KB (317 words) - 20:10, 1 May 2006
  • '''ME 4.5 Risk Management'''<br> ...sight, and their actual and potential business impact. The enterprise’s IT risk position should be transparent to all stakeholders.<br> ...
    2 KB (334 words) - 13:36, 4 May 2006
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> ...by <Your Company Name> to gauge and promote end-user awareness of managing risk with the use of security processes.<br> ...
    2 KB (305 words) - 17:31, 3 August 2006
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> ...by <Your Company Name> to gauge and promote end-user awareness of managing risk with the use of security processes.<br> ...
    2 KB (309 words) - 17:34, 3 August 2006
  • '''DS 5.1 Management of IT Security'''<br> Manage IT security at the highest appropriate organizational level, so the management of security actions is in line with business requirements. ...
    3 KB (394 words) - 17:12, 22 March 2007
  • Provides a framework for consistent, timely, and cost-effective management decisions.<br> ...rds of all federal agencies receive a superior grade for efforts to secure information systems.'''<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • Provides a framework for consistent, timely, and cost-effective management decisions.<br> ...rds of all federal agencies receive a superior grade for efforts to secure information systems.'''<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • '''PO 4.8 Responsibility for Risk, Security and Compliance'''<br> ...ity issues. Obtain direction from senior management on the appetite for IT risk and approval of any residual IT risks.<br> ...
    3 KB (370 words) - 18:04, 1 May 2006
  • ==IT Risk Management Process== ...he ability to mitigate IT risks is dependent upon risk assessments. Senior management should identify, measure, control, and monitor technology to avoid risks th ...
    4 KB (528 words) - 16:58, 28 March 2010
  • [[Risk Assessment and Treatment:|'''Risk Assessment and Treatment''']]<br> [[Organizing Information Security:|'''Organizing Information Security''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ...g to a business and service priority and routed to the appropriate problem management team, and customers kept informed of the status of their queries. '''Risk Association Control Activities:'''<br> ...
    2 KB (299 words) - 17:41, 5 May 2006
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (290 words) - 17:49, 25 April 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: IT function does not meet the organizational needs.'''<br> ...
    3 KB (356 words) - 17:11, 1 May 2006
  • ==Change Management== ...anges (fixes) - with minimum risk to IT infrastructure. The goal of Change Management is to ensure that standardized methods and procedures are used for efficien ...
    4 KB (588 words) - 16:23, 21 March 2007
  • ...rs, risk managers, the corporate compliance group, outsourcers and offsite management.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (342 words) - 18:20, 1 May 2006
  • ==IT Management Booklet== ...risk management processes to ensure effective information technology (IT) management.<br> ...
    5 KB (645 words) - 18:03, 27 April 2007
  • The problem management system should provide for adequate audit trail facilities that allow tracki ...rs on user services. In the event that this impact becomes severe, problem management should escalate the problem, perhaps referring it to an appropriate board t ...
    3 KB (451 words) - 17:52, 5 May 2006
  • ==Risk Association Control Activities:== ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (366 words) - 18:00, 25 April 2007
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (270 words) - 18:10, 25 April 2007
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (278 words) - 18:21, 25 April 2007
  • =='''Asset Management'''== ...It is about the management, control and protection of '''all''' aspects of Information / Data in whatever form for example paper records or X-Ray Film and fiche. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • Encourage IT management to define and execute ` procedures to ensure that the IT continuity plan is '''Risk Association Control Activities:'''<br> ...
    3 KB (436 words) - 14:30, 4 May 2006
  • ...report and classify problems that have been identified as part of incident management. The steps involved in problem classification are similar to the steps in c '''Risk Association Control Activities:'''<br> ...
    4 KB (601 words) - 15:01, 8 August 2006
  • '''PO 10.2 Project Management Framework'''<br> ...should be integrated with the enterprise portfolio management and program management processes.<br> ...
    3 KB (367 words) - 16:28, 21 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Production processes and associated controls operate as intended and suppo ...
    3 KB (420 words) - 14:06, 8 August 2006
  • '''DS 2.2 Supplier Relationship Management'''<br> Formalize the supplier relationship management process for each supplier. The relationship owners must liaise on customer ...
    3 KB (408 words) - 16:10, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: IT function does not meet the organizational needs.'''<br> ...
    3 KB (393 words) - 17:18, 1 May 2006
  • ...sks and responsibilities of internal and external service providers, their management and their customers, and the rules and structures to document, test and exe '''Risk Association Control Activities:'''<br> ...
    3 KB (456 words) - 17:15, 15 February 2007
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (270 words) - 14:54, 5 May 2006
  • '''PO 2.4 Integrity Management'''<br> '''Risk Association Control Activities:'''<br> ...
    4 KB (550 words) - 14:34, 1 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: IT function does not meet the organizational needs.'''<br> ...
    2 KB (338 words) - 19:03, 17 April 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: The transfer of programs into the live environment may not be appropriatel ...
    3 KB (377 words) - 14:55, 1 May 2006
  • ...nd services. The framework should integrate with the corporate performance management system.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (301 words) - 12:27, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...
    2 KB (351 words) - 13:57, 4 May 2006
  • ==AI 4.2 Knowledge Transfer to Business Management== ...rocesses. The knowledge transfer should include access approval, privilege management, segregation of duties, automated business controls, backup/recovery, physi ...
    3 KB (362 words) - 23:55, 14 June 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Job schedules can be easily ignored or circumvented, resulting in processi ...
    3 KB (467 words) - 18:39, 5 May 2006
  • ...chnology - Security techniques - Code of practice for information security management''. The current standard is a revision of the version published in [[2000]], ...ng or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...tory compliance and continuity requirements. This is related/linked to the information architecture.<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (446 words) - 16:36, 1 May 2006
  • ...and responsibilities for all personnel in the organization in relation to information systems to allow sufficient authority to exercise the role and responsibili '''Risk Association Control Activities:'''<br> ...
    3 KB (427 words) - 17:58, 1 May 2006
  • ==Risk Association Control Activities:== ::'''1. Risk: Operational failures may not be identified and resolved in an appropriate, ...
    2 KB (297 words) - 18:35, 25 April 2007
  • '''Risk Association Control Activities:'''<br> ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    4 KB (517 words) - 18:12, 21 June 2006
  • '''DS 1.1 Service Level Management Framework'''<br> ...ogue. The framework defines the organizational structure for service level management, covering the roles, tasks and responsibilities of internal and external se ...
    4 KB (524 words) - 15:03, 25 June 2006
  • ...ine the nature of the impact— positive, negative or both—and maintain this information.<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (459 words) - 17:56, 21 June 2006
  • '''DS 11.6 Security Requirements for Data Management '''<br> '''Risk Association Control Activities:'''<br> ...
    5 KB (649 words) - 18:23, 5 May 2006
  • =='''Information Security Presentation Samples'''== ...iness Security Evaluation - Comprehensive information security control and risk assessment guidance for the enterprise demystified. This presentation was o ...
    5 KB (653 words) - 12:45, 25 April 2007
  • '''PO 1.6 IT Portfolio Management'''<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (470 words) - 13:39, 6 March 2007
  • ...requirements regarding delivery of value from IT investments, appetite for risk, integrity, ethical values, staff competence, accountability and responsibi '''Risk Association Control Activities:'''<br> ...
    4 KB (580 words) - 18:00, 23 June 2006
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (303 words) - 18:16, 25 April 2007
  • ...steering committee (or equivalent) composed of executive, business and IT management to: Determine prioritization of IT-enabled investment programs in line with '''Risk Association Control Activities:'''<br> ...
    4 KB (506 words) - 20:00, 25 June 2006
  • '''DS 10.4 Integration of Change, Configuration and Problem Management '''<br> ...ents, integrate the related processes of change, configuration and problem management. Monitor how much effort is applied to firefighting rather than enabling bu ...
    2 KB (248 words) - 17:50, 5 May 2006
  • ...us communication program, supported by top management in action and words. Management should give specific attention to communicating IT security awareness and t '''Risk Association Control Activities:'''<br> ...
    3 KB (442 words) - 18:58, 1 May 2006
  • ...ation of IT resources for operations, projects and maintenance to maximize Information Technologies contribution to optimizing the return on the enterprise’s port '''Risk Association Control Activities:'''<br> ...
    2 KB (346 words) - 18:25, 1 May 2006
  • '''PO 9.5 Risk Response'''<br> ...fits and select responses that constrain residual risks within the defined risk tolerance levels.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • '''PO 10.3 Project Management Approach'''<br> Establish a project management approach commensurate with the size, complexity and regulatory requirements ...
    4 KB (594 words) - 19:50, 25 June 2006
  • ...799]], "Information Technology - Code of practice for information security management." in 2000. [[ISO/IEC 17799]] was then revised in June 2005 and finally inc ...security management system]] (ISMS), referring to the information security management structure and controls identified in BS 7799-2, which later became [[ISO/IE ...
    2 KB (249 words) - 10:56, 27 October 2012
  • <br>Produce reports of service desk activity to enable management to measure service performance and service response times and to identify t '''Risk Association Control Activities:'''<br> ...
    2 KB (264 words) - 17:42, 5 May 2006
  • ...software, facilities, technology, and user procedures) and ensure that the information security requirements are met by all components. The test data should be sa '''Risk Association Control Activities:'''<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Controls provide reasonable assurance that policies and procedures that de ...
    3 KB (471 words) - 12:32, 23 June 2006
  • ...that are needed to create, implement, and maintain a risk management-based Information Security Program that complies with SOX Section 404.<br> ...cies, and standards) that are needed to create, implement, and maintain an Information Security Program that complies with SOX Section 404.<br> ...
    1 KB (204 words) - 13:03, 14 July 2006
  • '''Risk Association Control Activities:''' ::'''1. Risk: Controls provide reasonable assurance that policies and procedures that de ...
    4 KB (537 words) - 13:57, 23 June 2006
  • '''PO 10.9 Project Risk Management'''<br> ...at have the potential to cause unwanted change. Risks faced by the project management process and the project deliverable should be established and centrally rec ...
    3 KB (403 words) - 12:37, 23 June 2006
  • ...anagement procedure. Include periodic review against business needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requ '''Risk Association Control Activities:'''<br> ...
    6 KB (819 words) - 13:54, 23 June 2006
  • '''DS 12.5 Physical Facilities Management '''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (268 words) - 15:01, 8 May 2006
  • ...er include access rights and privilege management, protection of sensitive information at all stages, authentication and transaction integrity, and automatic reco '''Risk Association Control Activities:'''<br> ...
    3 KB (374 words) - 15:05, 3 May 2006
  • ...t Operations Framework (MOF) 4.0''' is a series of guides aimed at helping information technology (IT) professionals establish and implement reliable, cost-effect ...| governance]], [[Risk_management | risk]], and [[compliance]] activities; management reviews, and Microsoft Solutions Framework (MSF) best practices.<br> ...
    3 KB (461 words) - 14:19, 23 April 2010
  • ...ual responsible for the function and which exceptions should be escalated. Management is also responsible to inform affected parties.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (289 words) - 13:11, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Operational failures may not be identified and resolved in an appropriate, ...
    2 KB (324 words) - 14:50, 4 May 2006
  • ...nd prioritization of any reported issue as an incident, service request or information request. Measure end users’ satisfaction with the quality of the service de '''Risk Association Control Activities:'''<br> ...
    2 KB (340 words) - 17:40, 5 May 2006
  • ...ual responsible for the function and which exceptions should be escalated. Management is also responsible to inform affected parties.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (289 words) - 12:56, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Systems do not meet business needs because not all business functional and ...
    4 KB (510 words) - 13:54, 1 May 2006
  • ...ange processes. The IT process framework should be integrated in a quality management system and the internal control framework.<br> ...ay provide invalid information, which could result in unreliable financial information and reports.<br> ...
    5 KB (699 words) - 19:59, 25 June 2006
  • '''MANAGEMENT CONTROL '''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (354 words) - 20:12, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...
    2 KB (303 words) - 17:36, 5 May 2006
  • ==Information Security Policy== ...ective of this category is to provide management direction and support for information security in accordance with business requirements and all relevant laws, re ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...d so security incidents can be properly treated by the incident or problem management process. Characteristics include a description of what is considered a secu '''Risk Association Control Activities:'''<br> ...
    4 KB (548 words) - 14:21, 4 May 2006
  • ...ata classification policy and the enterprise’s media storage practices. IT management should ensure that offsite arrangements are periodically assessed, at least '''Risk Association Control Activities:'''<br> ...
    5 KB (700 words) - 18:07, 23 June 2006
  • '''DS 2.3 Supplier Risk Management'''<br> ...iness standards in accordance with legal and regulatory requirements. Risk management should further consider non-disclosure agreements (NDA), escrow contracts, ...
    7 KB (958 words) - 16:01, 25 June 2006
  • '''PO 5.1 Financial Management Framework'''<br> ...these portfolios to the budget prioritization, cost management and benefit management processes.<br> ...
    2 KB (353 words) - 18:22, 1 May 2006
  • '''PO 6.2 Enterprise IT Risk and Internal Control Framework'''<br> ...be aimed at maximizing success of value delivery while minimizing risks to information assets through preventive measures, timely identification of irregularities ...
    2 KB (331 words) - 18:47, 1 May 2006
  • '''PO 9.4 Risk Assessment'''<br> ...e methods. The likelihood and impact associated with inherent and residual risk should be determined individually, by category and on a portfolio basis.<br ...
    2 KB (304 words) - 20:21, 1 May 2006
  • ...ormation requirements, IT configuration, information risk action plans and information security culture into an overall IT security plan. The plan is implemented '''Risk Association Control Activities:''' ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.'''<br> ...
    2 KB (327 words) - 13:18, 4 May 2006
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (272 words) - 18:05, 25 April 2007
  • ::'''1. Risk: Insufficient control over authorization, authentication, nonrepudiation, d ...y policy exists and has been approved by an appropriate level of executive management. ...
    3 KB (351 words) - 16:49, 25 June 2006
  • ...d standards controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.<br> ...d support for information security. This section provides templates for an Information Security Program Charter and supporting policies that are required to compl ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Terminated entities create unacceptable control risks to the Company.'''<b ...
    3 KB (366 words) - 16:39, 26 June 2006
  • ...rization controls over the initiation of transactions, resulting financial information may not be reliable. '''Risk Association Control Activities:'''<br> ...
    5 KB (721 words) - 11:49, 28 March 2008
  • '''PO 9.6 Maintenance and Monitoring of a Risk Action Plan'''<br> ...s). Monitor execution of the plans, and report on any deviations to senior management.<br> ...
    2 KB (325 words) - 01:16, 2 May 2006
  • '''AI 2.9 Applications Requirements Management'''<br> ...being approved through an established [[Change_control | change control]] management process.<br> ...
    2 KB (274 words) - 13:47, 6 March 2007
  • Ensure that IT management, working with the business, defines a balanced set of performance objective * Risk and compliance with regulations.<br> ...
    3 KB (362 words) - 12:33, 4 May 2006
  • ==Information Security Aspects of Business Continuity Management== ..., interruptions to business activities and processes caused by failures of information systems. ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ==Financial Management== ...ery section of the [[ITIL]] best practice framework. The aim of Financial Management for IT Services is to give accurate and cost effective stewardship of IT as ...
    6 KB (885 words) - 10:12, 23 March 2007
  • '''PO 8.1 Quality Management System'''<br> ...conformity. The QMS should define the organizational structure for quality management, covering the roles, tasks and responsibilities. All key areas develop thei ...
    2 KB (337 words) - 19:47, 1 May 2006
  • ...n repository and be properly integrated with change management and problem management procedures. '''Rationale —''' Configuration management includes procedures such that security, availability and processing integri ...
    3 KB (429 words) - 18:55, 25 June 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (281 words) - 17:42, 5 May 2006
  • ...support of the business to initiate, record, process and report financial information. Deficiencies in this area could significantly impact an entity’s financial '''Risk Association Control Activities:''' ...
    4 KB (522 words) - 20:12, 25 June 2006
  • ...y to explain deviations and performance problems. Upon review, appropriate management action should be initiated and controlled.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (347 words) - 13:38, 4 May 2006
  • ...ves, or from programs, projects or service improvement initiatives. Change Management can ensure standardized methods, processes and procedures are used for all ==Change management in development projects== ...
    4 KB (523 words) - 10:24, 23 April 2010
  • * Review, negotiation and establishment of management responses.<br> * Assignment of responsibility for remediation (can include risk acceptance).<br> ...
    2 KB (286 words) - 13:05, 4 May 2006
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)