Domain

IT Operations Knowledge Archive – Page 45

Primer on Business Continuity Planning

This excellent primer on business continuity planning provides an in-depth introduction to BCP, discusses its key concepts and terminology, identifies key BCP roles, and details a step-by-step process to create a business continuity plan for your organization.

IT Security Metrics Guide

This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and procedures. It provides an approach to help management decide where to invest in additional security protection resources or identify and evaluate nonproductive controls. It explains the metric development and implementation process and how it can also be used to adequately justify security control investments. The results of an effective metric program can provide useful data for directing the allocation of information security resources and should simplify the preparation of performance-related reports. (100 pages)

IT Security Guide For SME

This document provides practical guidance to information technology managers on securing the small and mid size enterprise. It introduces the key risks and threats to security and how to mitigate and manages them.

Guide for IT Security Controls Assessment

This document provides guidance on assessing security controls in information systems and organizations. Security controls assessment is the primary mechanism to verify that information systems and organizations are meeting their stated security goals and objectives. (400 Pages) The assessment results provide senior managers with: Evidence about the effectiveness of security

Introduction to IT Security Governance

This presentation introduces information technology governance and information security governance and key concepts related to them – what is IT governance? what is IT security governance? what is the IT security Governance framework? what are some leading practices in implementing IT security governance?

IT Security Self Assessment Guide

Explore this IT Security Self-Assessment Guide, an invaluable resource for IT leaders aiming to enhance their cybersecurity strategy. With five levels of standardized security status and 17 critical control areas, this guide helps you understand your current security posture and identify areas for improvement. Strengthen your defenses and secure your digital assets today.

Big Data DBMS

This presentation defines big data and discusses the key considerations in planning, and implementing a big data supporting database management system (DBMS)

Prioritizing IT Security Investments

This document provides guidance on integrating IT security and IT Investment Management processes. Applying funding towards high-priority security investments supports the objective of maintaining appropriate security controls, both at the enterprise-wide and system level, commensurate with levels of risk and data sensitivity. This paper introduces common criteria against which managers can prioritize security activities to ensure that corrective actions are incorporated into the capital planning process to deliver maximum security in a cost-effective manner. (70 Pages)

Architecture-Driven Modernization Guide

This presentation provides an in-depth overview of the architecture driven modernization approach of the Object Management Group (OMG). It introduces the key concepts in architecture driven modernization aka Architecture driven modernization 101, discusses business driven modernization, details techniques for application assessment and migration, and illustrates these concepts through case studies and scenarios. (150+ pages)

CIO Portal