Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • ...done on time and on budget, you know it can be a challenge. Learn project management practices that make the e-Discovery process easier. You’ll improve planning Click [[File:ediscovery-project-manage.pdf]] for more information. ...
    402 bytes (59 words) - 10:44, 16 March 2010

Page text matches

  • '''PO 10.2 Project Management Framework'''<br> ...should be integrated with the enterprise portfolio management and program management processes.<br> ...
    3 KB (367 words) - 16:28, 21 June 2006
  • ...done on time and on budget, you know it can be a challenge. Learn project management practices that make the e-Discovery process easier. You’ll improve planning Click [[File:ediscovery-project-manage.pdf]] for more information. ...
    402 bytes (59 words) - 10:44, 16 March 2010
  • '''PO 10.3 Project Management Approach'''<br> ...ojects have sponsors with sufficient authority to own the execution of the project within the overall strategic program.<br> ...
    4 KB (594 words) - 19:50, 25 June 2006
  • ==Change Management== ...anges (fixes) - with minimum risk to IT infrastructure. The goal of Change Management is to ensure that standardized methods and procedures are used for efficien ...
    4 KB (588 words) - 16:23, 21 March 2007
  • '''PO 10.9 Project Risk Management'''<br> ...use unwanted change. Risks faced by the project management process and the project deliverable should be established and centrally recorded.<br> ...
    3 KB (403 words) - 12:37, 23 June 2006
  • ...ves, or from programs, projects or service improvement initiatives. Change Management can ensure standardized methods, processes and procedures are used for all ==Change management in development projects== ...
    4 KB (523 words) - 10:24, 23 April 2010
  • '''PO 10.10 Project Quality Plan'''<br> ...reed to by all parties concerned and then incorporated into the integrated project plan.<br> ...
    2 KB (295 words) - 01:42, 2 May 2006
  • ==Configuration Management == ...re or software upgrade, a computer technician can access the configuration management program and database to see what is currently installed. The technician can ...
    7 KB (942 words) - 15:09, 23 March 2007
  • [[PO1.1:| 1.1 IT Value Management]]<br> [[PO1.6:| 1.6 IT Portfolio Management]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...rily out of [[ISO/IEC 17799]], a code of practice for information security management published by the [[International Organization for Standardization]] in 2000 ...can be used as a template to make ISO 9001 compliant information security management systems. While ISO 27001 is controls based, ISM3 is process based. ISM3 has ...
    2 KB (257 words) - 17:09, 22 March 2007
  • ...ively manage the set tactical IT plans and initiatives through analysis of project and service portfolios. This encompasses balancing requirements and resourc ...ments analysis was performed and appropriately approved (including account management and IT security). Obtain and examine documents associated with requirements ...
    4 KB (510 words) - 13:54, 1 May 2006
  • ...ments analysis was performed and appropriately approved (including account management and IT security). Obtain and examine documents associated with requirements :::a. SOX.1.9: Each project sample has an associated project plan.<br> ...
    3 KB (446 words) - 16:36, 1 May 2006
  • ...sition, and maintenance process includes numerous risks. Effective project management influences operational risks (also referred to as transactional risks). The ...d controls and discusses various development, acquisition, and maintenance project risks. Action summaries highlight the primary considerations within each se ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • ...DOI A.1''']] Is there an IS steering committee or other evidence that top management is involved in the IS function and, if so, who are the members? Please prov * [[PO10.3:|'''PO 10.3 Project Management Approach''']]<br> ...
    3 KB (346 words) - 21:58, 23 June 2006
  • '''PO 10.1 Program Management Framework'''<br> ITIL ICT Infrastructure Management.<br> ...
    2 KB (345 words) - 01:18, 2 May 2006
  • ...ystems produce inaccurate results or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milesto :::a. [[SOX.1.2:|'''SOX.1.2''']] IT management involves users in the design of applications, selection of packaged softwar ...
    3 KB (394 words) - 11:59, 23 June 2006
  • ...he elements of a control environment for IT, aligned with the enterprise’s management philosophy and operating style. These elements include expectations/require ...ments analysis was performed and appropriately approved (including account management and IT security). Obtain and examine documents associated with requirements ...
    4 KB (580 words) - 18:00, 23 June 2006
  • ...1.9:|'''SOX.1.1.9''']] Validate that each project sample has an associated project plan.<br> ITIL 6.1.4 Change management.<br> ...
    3 KB (424 words) - 17:01, 21 June 2006
  • ...hnique to identify and assess factors that may jeopardize the success of a project or achieving a goal. This technique also helps define preventive measures t ...of scenarios have been calculated with risk analysis, the process of risk management can be applied to help manage the risk. ...
    1 KB (215 words) - 18:32, 13 April 2007
  • A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source sof ...channels of service and support? How often is the project updated? Is the project run by an established nonprofit group or stable vendor?<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • '''Federal Information Security Management Act (FISMA)''' ...the implementation of and compliance with the Federal Information Security Management Act including: ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • ...demands. Enforce a disciplined approach to portfolio, program and project management, insisting that the business takes ownership of all IT-enabled investments ...
    3 KB (393 words) - 14:35, 21 June 2006
  • ...ystems produce inaccurate results or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milesto :::a. SOX.1.2: IT management involves users in the design of applications, selection of packaged softwar ...
    3 KB (354 words) - 13:39, 22 June 2006
  • ::[[Image:Key-control.jpg]][[PCI-6.4.2:|PCI-6.4.2 Management sign-off by appropriate parties.]]<br> ...ased on secure coding guidelines such as the Open Web Application Security Project guidelines. Review custom application code to identify coding vulnerabiliti ...
    4 KB (578 words) - 18:46, 28 February 2007
  • ...ogy department and their status. Note: It is not common to report current project status inside a future-looking strategy document. *** Example: Availability of open-source [[learning management system]]s such as [[Moodle]] ...
    5 KB (777 words) - 17:59, 16 February 2007
  • ==Welcome to the Holistic Operational Readiness Security Evaluation (HORSE) project Wiki.== ...educational content, and to providing the full content of this wiki-based project to the public free of charge.<br> ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...ystems produce inaccurate results or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milesto :::a. [[SOX.1.2:|'''SOX.1.2''']] IT management involves users in the design of applications, selection of packaged softwar ...
    4 KB (530 words) - 11:58, 23 June 2006
  • ==Software Configuration Management== Software Configuration Management (SCM) is the discipline whose objective is to identify the configuration of ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • '''DS 11.6 Security Requirements for Data Management '''<br> ...security requirements should be identified at the requirements phase of a project and justified, agreed, and documented as part of the overall business case ...
    5 KB (649 words) - 18:23, 5 May 2006
  • ...ystems produce inaccurate results or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milesto :::a. [[SOX.1.2:|'''SOX.1.2''']] IT management involves users in the design of applications, selection of packaged softwar ...
    3 KB (365 words) - 19:02, 17 April 2007
  • '''Rationale —''' Configuration management includes procedures such that security, availability and processing integri ...ystems produce inaccurate results or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milesto ...
    4 KB (501 words) - 18:24, 25 June 2006
  • ...formation systems, a formal evaluation and approval of the test results by management of the affected user department(s) and the IT function. The tests should co ...security requirements should be identified at the requirements phase of a project and justified, agreed, and documented as part of the overall business case ...
    5 KB (730 words) - 19:05, 17 April 2007
  • ...the agencies and revised, if necessary, based on examiner feedback. Senior management of each agency performed the final review and approval and then formally re :* IT Management ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...anagement procedure. Include periodic review against business needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requ ...security requirements should be identified at the requirements phase of a project and justified, agreed, and documented as part of the overall business case ...
    6 KB (819 words) - 13:54, 23 June 2006
  • '''DS 2.3 Supplier Risk Management'''<br> ...iness standards in accordance with legal and regulatory requirements. Risk management should further consider non-disclosure agreements (NDA), escrow contracts, ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ...estments that will support the overall business goals, each significant IT project and expenditure must be linked to a specific business goal. Furthermore, th ...ss leadership to prioritize the portfolio. Each line item in the master IT project list is evaluated against the overall business goals, and the business lead ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...mation technology (IT) systems and their performance management and [[risk management]]. The rising interest in IT governance is partly due to compliance initiat ...ce]] and deals primarily with the connection between business focus and IT management of an organization. It highlights the importance of information technology ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...security requirements should be identified at the requirements phase of a project and justified, agreed, and documented as part of the overall business case :::If considered appropriate, for example for cost reasons, management may wish to make use of independently evaluated and certified products. Fur ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...of government contractors' ''processes'' to perform a contracted software project. The CMM is based on the process maturity framework first described in the ...technology (IT), services, business processes generally, and human capital management. The CMM has been used extensively worldwide in government, commerce, indus ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...security requirements should be identified at the requirements phase of a project and justified, agreed, and documented as part of the overall business case :::*If considered appropriate, for example for cost reasons, management may wish to make use of independently evaluated and certified products. Fur ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...cording to whether the risk management method is in the context of project management, security, risk analysis, industrial processes, financial portfolios, actua Certain aspects of many of the risk management standards have come under criticism for having no measurable improvement on ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ==Security Management== ...urity Management is based on the code of practice for information security management also known as ISO/IEC 17799. ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ...Name>''' (the "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for prop ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for the de ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • #[[Getting it Right in Records Management | Getting it Right in Records Management]] ...rds management survey - call for sustainable ... | 2009 electronic records management survey - call for sustainable ...]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...covered that with an organized, systematic approach, you can approach risk management effectively. Risk simply put is the negative impact to business assets by t ...lping you understanding the core elements of a successful IT security risk management program for a commercial enterprise, the processes of calculating the cost ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]]s that are intended to support businesses in achieving both qu ...s (hence the term ''Library''), each of which covers a core area within IT Management. The names ''ITIL'' and ''IT Infrastructure Library'' are Registered Trade ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ==Risk Management== ...ng some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disas ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ::* Management’s role in IT audit activities; :3. Review management’s response to issues raised since the last examination. Consider: ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ...of the number of network members, which very quickly requires complex key management schemes to keep them all straight and secret. The difficulty of establishin ===Digital Rights Management=== ...
    26 KB (3,873 words) - 11:44, 28 March 2008
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)