Robert E. Davis's Blog, page 8

February 6, 2011

Information security management: trans-border communication protection – part 1

Legal compliance with local, national and regional privacy requirements is complex and dynamic. Every problem on the local level compounds exponentially when private data is shared across multiple jurisdictions. What data is private, who possess...
 •  0 comments  •  flag
Share on Twitter
Published on February 06, 2011 12:21

January 30, 2011

Information security management: preserving evidence - part 2

Do you like this story?Creating evidential copies through routine backup procedures will only permit replicating specific files while none of the files with delete indicators are recovered, nor the designated 'free space' between files. To remediate this...[image error]
 •  0 comments  •  flag
Share on Twitter
Published on January 30, 2011 12:10

January 24, 2011

Information security management: preserving evidence - part 1

Do you like this story?Seeking to preserve electronically encoded evidence implies an incident or event has occurred that will require facts extrapolation for presentation as proof of an irregular, if not illegal act. Anticipating this potential scenario requires...[image error]
 •  0 comments  •  flag
Share on Twitter
Published on January 24, 2011 20:36

January 21, 2011

Information security management: assessing deployed controls - part 2

Do you like this story?Information security managers should prepare for audits utilizing control self-assessments to verify compliance with laws, regulations, policies and procedures. It is always a sound idea to strategically plan annual control self-assessments....[image error]
 •  0 comments  •  flag
Share on Twitter
Published on January 21, 2011 08:42

January 17, 2011

Information security management: assessing deployed controls - part 1

Do you like this story?For most entities, information and related technologies compliance management is critical to survival as well as success. As with other organizational programs, security compliance does not occur through managerial intent transmissions from a...
 •  0 comments  •  flag
Share on Twitter
Published on January 17, 2011 07:46

Information Security Management: Assessing Deployed Controls - part 1

Do you like this story?For most entities, information and related technologies compliance management is critical to survival as well as success. As with other organizational programs, security compliance does not occur through managerial intent transmissions from a...[image error]
 •  0 comments  •  flag
Share on Twitter
Published on January 17, 2011 07:46

January 12, 2011

More details on why developing an IT Balanced Scorecard is important...

Do you like this story?Balanced Scorecard is a strategic planning and management system that can be utilized in for-profit and not-for-profit entities for business activities alignment to the organizational mission, communication improvement as well as monitoring...
 •  0 comments  •  flag
Share on Twitter
Published on January 12, 2011 10:50

January 7, 2011

Why developing an IT Balanced Scorecard is important to the City of Philadelphia

Do you like this story?According to an International City/County Management Association (ICMA) web posting, dated July 10, 2010, by Jeff Friedman - Chief of Staff - Division of Technology for the City of Philadelphia, "We're looking to put together metrics for...
 •  0 comments  •  flag
Share on Twitter
Published on January 07, 2011 12:46

January 3, 2011

Information security management: measuring delivery value - part 2

Do you like this story?Information security service management can include financial and non-financial indicators to enable performance assessments. However, selected indicators must represent a mathematically measurable quality. An adopted KPI should have an...[image error]
 •  0 comments  •  flag
Share on Twitter
Published on January 03, 2011 08:21

December 30, 2010

Information security management: measuring delivery value - part 1

Do you like this story?Considering adamant demands for continuous process improvements, focus on overall information protection and delivery value in terms of enabled services has become a managerial necessity.Managing IT security configurations as a serviceInformation...[image error]
 •  0 comments  •  flag
Share on Twitter
Published on December 30, 2010 06:44