Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...ry as a basic framework for implementing effective corporate governance of Information and communication technologies within any organization.<br> ...tm?refid=Ref1135 ISO/IEC standard for corporate governance of information technology].<br> ...
    1 KB (150 words) - 16:22, 20 April 2010
  • ...mation will hopefully assist you in finding your way around this expanding information security, compliance, risk, educational, and I trust, enlightening communit * [[Law|Technology Law]] Legal issues related to information technology, prosecutions and defense is covered also. ...
    2 KB (313 words) - 09:44, 3 April 2009
  • ...nce of information technology standard, provides a framework for effective governance of IT to assist those at the highest level of organizations to understand a ...ganizations on the effective, efficient, and acceptable use of Information Technology (IT) within their organizations. It is organized into three prime sections, ...
    1 KB (147 words) - 12:21, 2 May 2010
  • ...cial institution risk management processes to ensure effective information technology (IT) management.<br> ...of technology raise the importance of IT management in effective corporate governance.<br> ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ...curity Evaluation (HORSE) Project Wiki''' is evolving every day. There are information security practitioners adding content and providing guidance to the end use It is our hope that one day this will be the most authoritative comprehensive information security wiki on the planet. ...
    2 KB (268 words) - 12:11, 7 March 2014
  • ...Framework (MOF) 4.0''' is a series of guides aimed at helping information technology (IT) professionals establish and implement reliable, cost-effective service ...2008, MOF 4.0 integrates community-generated processes; [[It-governance | governance]], [[Risk_management | risk]], and [[compliance]] activities; management re ...
    3 KB (461 words) - 14:19, 23 April 2010
  • [[Category:Information technology management|Governance]] [[Category:Information technology governance| ]] ...
    2 KB (235 words) - 09:48, 23 October 2012
  • ...It is about the management, control and protection of '''all''' aspects of Information / Data in whatever form for example paper records or X-Ray Film and fiche. ...of information and data that is critical to the organization. Weather the information data is Held, Obtained, Recorded, Used, Shared (HORUS)*. The data may be pe ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...1_2?ie=UTF8&qid=1343669379&sr=1-2 Governance Documentation and Information Technology Security Policies Demystified]''' is available on bookshelves everywhere in ...policies. The guidance contained within has been the bedrock for corporate governance within some of the biggest organizations throughout the world.<br> ...
    3 KB (488 words) - 20:33, 12 October 2014
  • ...performance management and [[risk management]]. The rising interest in IT governance is partly due to compliance initiatives, for instance [[Sarbanes-Oxley]] in ...ssues was to defer all key decisions to the company's IT professionals. IT governance implies a system in which all stakeholders, including the board, internal c ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...rocess''' that tracks all of the individual Configuration Items (CI) in an information system which may be as simple as a single server, or as complex as the enti ...mental component of CM is the CM database ([[CMDB]]) which contains the CI information and is used to understand the CI relationships and track their configuratio ...
    4 KB (570 words) - 16:12, 23 March 2007
  • ...most comprehensive, most beneficial, most accessible, and freely available information security guidance framework on the planet.<br> ...zation no matter what the size, shape, or form they come in. By protecting information, you protect identities, profits, reputations, and the list goes on and on. ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...in delivering on the strategy. Work with the board to define and implement governance bodies, such as an IT strategy committee, to provide strategic direction to Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ...tled ''Information technology - Security techniques - Code of practice for information security management''. The current standard is a revision of the version pu ...ng or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...ons and requirements on the proper and appropriate business use of Company Technology Resources while using a Company supported and or Employee-owned device. ## Company Technology Resources are provided primarily for official and authorized Company busine ...
    10 KB (1,433 words) - 18:15, 14 January 2014
  • ==FFIEC Information Technology Examination Handbook Executive Summary== ...ve effort of the FFIEC’s five member agencies, has replaced the 1996 FFIEC Information Systems Examination Handbook (1996 Handbook). ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...ing information management costs through automated categoriza... | Cutting information management costs through automated categoriza...]] #[[Enterprise Fax Technology: Changing with the Times | Enterprise Fax Technology: Changing with the Times]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...tled ''Information technology - Security techniques - Code of practice for information security management''. ...ng or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...res that all user organizations and their auditors have access to the same information and in many cases this will satisfy the user auditor's requirements.<br> ...ol oriented professionals who have experience in accounting, auditing, and information security. A SSAE 16 engagement allows a service organization to have its co ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...systems and processes used for those purposes. While focused dominantly on information in digital form, the full range of IA encompasses not only digital but also Information assurance as a field has grown from the practice of [[information security]] which in turn grew out of practices and procedures of [[computer ...
    7 KB (983 words) - 10:41, 15 April 2012
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)