Search results

Jump to navigation Jump to search
  • '''PO 1.4 IT Strategic Plan'''<br> ...strategy, acquisition strategy, and legal and regulatory requirements. The strategic plan should be sufficiently detailed to allow the definition of tactical IT ...
    3 KB (424 words) - 17:01, 21 June 2006
  • '''ME 4.2 Strategic Alignment'''<br> ...erations, encouraging co-responsibility between business and IT for making strategic decisions and obtaining benefits from IT-enabled investments.<br> ...
    3 KB (410 words) - 13:30, 4 May 2006
  • [[ME4.2:| 4.2 Strategic Alignment]]<br> [[ME4.4:| 4.4 Resource Management]]<br> ...
    2 KB (195 words) - 19:06, 14 June 2007
  • =='''Asset Management'''== ...mation security perspective is not just about 'IT' Assets. It is about the management, control and protection of '''all''' aspects of Information / Data in whate ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...ance, as part of corporate governance, is adequately addressed, advises on strategic direction and reviews major investments on behalf of the full board.<br> :::a. SOX.2.0.1: Organizational policies and management procedures are in place to ensure the IT function is controlled properly.<b ...
    3 KB (356 words) - 17:11, 1 May 2006
  • '''PO 10.3 Project Management Approach'''<br> ...ufficient authority to own the execution of the project within the overall strategic program.<br> ...
    4 KB (594 words) - 19:50, 25 June 2006
  • '''MANAGEMENT CONTROL '''<br> ...DOI A.1''']] Is there an IS steering committee or other evidence that top management is involved in the IS function and, if so, who are the members? Please prov ...
    2 KB (354 words) - 20:12, 25 June 2006
  • ...rements and resources on a regular basis, comparing them to achievement of strategic and tactical goals and the expected benefits, and taking appropriate action ...ments analysis was performed and appropriately approved (including account management and IT security). Obtain and examine documents associated with requirements ...
    4 KB (510 words) - 13:54, 1 May 2006
  • ITIL Applications Management.<br> ITIL The Application Management Lifecycle.<br> ...
    3 KB (377 words) - 14:55, 1 May 2006
  • ==IT Management Booklet== ...risk management processes to ensure effective information technology (IT) management.<br> ...
    5 KB (645 words) - 18:03, 27 April 2007
  • '''ME 4.4 Resource Management'''<br> ...current and future strategic objectives and keep up with business demands. Management should put clear, consistent and enforced human resources policies and proc ...
    2 KB (329 words) - 13:34, 4 May 2006
  • '''PO 1.6 IT Portfolio Management'''<br> ...e portfolio of IT-enabled investment programs required to achieve specific strategic business objectives by identifying, defining, evaluating, prioritizing, sel ...
    3 KB (470 words) - 13:39, 6 March 2007
  • [[PO1:| '''1 Define a Strategic IT Plan''']]<br> [[PO1.1:| 1.1 IT Value Management]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • Ensure that IT management, working with the business, defines a balanced set of performance objective * Performance against the strategic business and IT plan.<br> ...
    3 KB (362 words) - 12:33, 4 May 2006
  • ==Communications and Operations Management== ...y and cost effective service to client financial institutions. Institution management should monitor any changes in the current strategies and plans of independe ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ===Link Strategic IT Planning to Business Goals=== ...commendations here — implementing a Business Services Model (BSM), linking strategic IT planning to business goals, and creating a three-dimensional organizatio ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...tain a technological infrastructure plan that is in accordance with the IT strategic and tactical plans. The plan is based on the technological direction and in ITIL ICT Infrastructure Management, Technical Support.<br> ...
    2 KB (351 words) - 17:03, 21 June 2006
  • ...ange processes. The IT process framework should be integrated in a quality management system and the internal control framework.<br> ...DOI A.1''']] Is there an IS steering committee or other evidence that top management is involved in the IS function and, if so, who are the members? Please prov ...
    5 KB (699 words) - 19:59, 25 June 2006
  • ...inancial and non-financial metrics used to quantify objectives to reflect strategic performance of an organization. KPIs are used in Business Intelligence to a Among the areas top management analyzes are:<br> ...
    5 KB (786 words) - 16:48, 22 March 2007
  • ...llowing aspects of on-line loan origination and approval tend to make risk management of the lending process more challenging. If not properly managed, these asp ==Strategic Risk== ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...tify trends in usage, particularly in relation to business applications or management information system tools. Managers should use this information to identify ITIL 4.5 Establishing the IS direction ICT Infrastructure Management, Design and Planning.<br> ...
    4 KB (586 words) - 01:37, 1 May 2006
  • ...tives and backlogged transactions, and the costs associated with downtime. Management should establish recovery priorities for business processes that identify e ...ss processes based on their importance to the institution's achievement of strategic goals and maintenance of safe and sound practices. However, this prioritiza ...
    3 KB (453 words) - 18:45, 25 April 2007
  • ...y policy exists and has been approved by an appropriate level of executive management. ...SOX.2.0.19''']] An IT security plan exists that is aligned with overall IT strategic plans. The IT security plan is updated to reflect changes in the IT environ ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ** '''IT [[Project Portfolio Management]]''' - An inventory of current projects being managed by the information te *** Example: Availability of open-source [[learning management system]]s such as [[Moodle]] ...
    5 KB (777 words) - 17:59, 16 February 2007
  • ...the agencies and revised, if necessary, based on examiner feedback. Senior management of each agency performed the final review and approval and then formally re :* IT Management ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • :* Stealing strategic or customer data for corporate espionage or fraud schemes. ...nformation sharing outside of that required for legitimate business needs. Management should obtain signed confidentiality agreements before granting new employe ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ...equiring expertise in accounting, fraud examination, [[forensic science]], management science, systems engineering, [[security engineering]], and [[criminology]] ...complete, the IA practitioner then develops a [[Risk Management Plan|risk management plan]]. This plan proposes countermeasures that involve mitigating, elimina ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...mation technology (IT) systems and their performance management and [[risk management]]. The rising interest in IT governance is partly due to compliance initiat ...n technology related matters in contemporary organizations and states that strategic IT decisions should be owned by the corporate board, rather than by the ch ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...that information security management processes are integrated with agency strategic and operational planning processes;<br> ::'''(A)''' shall include testing of management, operational, and technical controls of every information system identified ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...that information security management processes are integrated with agency strategic and operational planning processes;<br> ::'''(A)''' shall include testing of management, operational, and technical controls of every information system identified ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source sof ...that are preferred over the ones that are ill-fitted to your enterprise's strategic needs. Most important, however, you must clearly lay out scenarios of "fitn ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...covered that with an organized, systematic approach, you can approach risk management effectively. Risk simply put is the negative impact to business assets by t ...lping you understanding the core elements of a successful IT security risk management program for a commercial enterprise, the processes of calculating the cost ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]]s that are intended to support businesses in achieving both qu ...s (hence the term ''Library''), each of which covers a core area within IT Management. The names ''ITIL'' and ''IT Infrastructure Library'' are Registered Trade ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...ancial information is critical for day-to-day business decisions regarding strategic planning, capital acquisition, credit decisions, supplier partnerships, and ...box logging is to protect a continuous auditing system against auditor and management manipulations. ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...pted to accomplish this by setting up [[risk management|risk]] and capital management requirements designed to ensure that a bank has capital adequacy for the ri ...er the title of residual risk. It gives banks a power to review their risk management system. ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • The board of directors and senior management are responsible for ensuring that the institution’s system of internal cont ...hould assign responsibility for the internal audit function to a member of management (hereafter referred to as the “internal audit manager”) who has sufficient ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ::* Management’s role in IT audit activities; :3. Review management’s response to issues raised since the last examination. Consider: ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ==Risk Management== ...ng some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disas ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...evidence stored in computers and electronic media. Section B discusses the strategic considerations any investigator or attorney should bear in mind before appl ...h warrant into an unconstitutional general warrant. United States v. Fleet Management Ltd., 521 F. Supp. 2d 436, 443-44 (E.D. Pa. 2007); see also Otero, 563 F.3d ...
    138 KB (21,660 words) - 13:18, 5 August 2011