background preloader

Security

Facebook Twitter

COBIT-5-Protecting-Data-Infographic.gif (GIF Image, 792×1333 pixels) CIO Strategy – IT Management – Information Value. Information is the currency of the 21st century enterprise. The challenge is how to govern and manage this information effectively. COBIT 5 is the latest edition of ISACA’s globally accepted framework, providing an end-to-end business view of the governance of enterprise IT that reflects the central role of information and technology in creating value for enterprises. The principles, practices, analytical tools and models found in COBIT 5 embody thought leadership and guidance from experts around the world. INSIGHTS for CIO's ISACA’s knowledge base of practical guidance, benchmarks and frameworks help enterprise leaders throughout the world adhere to regulations, build efficiencies, and improve the value of information and technology. Within these pages we provide the necessary insights into COBIT 5 and other ISACA thought leadership.

The need for enterprise-grade file sharing and synchronisation from Accellion - White Paper - IDGConnect.co.uk. Hackers fool bank security system. ISO 27000 - ISO 27001 and ISO 27002 Standards. ISO17799 / ISO 17799 and ISO 27001 / ISO27001 News. Security Case Studies. Security case studies: Selected in-depth explorations of how leading organizations have approached critical security challenges. These case studies provide the chance to learn from your peers, whether you are creating an overall strategy or working to solve a specific tactical security problem. (Note: None of these articles were written or sponsored by product and service providers.) Case study collection updated 10/16/2012. Use these quicklinks to skip to any desired section: Leadership and Organizational Issues Governance, risk and complianceFiserv's GRC process and software implementation (2012) GRC is a process, not a technology.

Alignment with corporate mission and profitabilityDunkin' Brands security focuses on making dough (2010)Insider registration.] Aligning corporate security with corporate priorities makes everyone's fortunes rise. E-discoveryNBC Universal takes e-discovery inhouse (2010) NBC Universal saw requests for e-discovery services soar in just a few years. [Also read. Peter Cochrane's Blog: So you think you've got security nailed down? | Security | silicon.com. Android security: Don't let 2012 become the year of the bad app | CIO Insights | silicon.com. Businesses suffering from online crime to get helping hand from GCHQ hub | Security | silicon.com.