Domain

IT Operations Knowledge – Page 64

Global Information Security Survey (2010)

As organizational boundaries vanish, so does the traditional information security paradigm. This survey of over 1600 participants from 56 countries highlights the information security challenges facing organizations today and how they are managing them – so you can focus on the most critical risks, and identify your strengths and weaknesses to improve information security

Information Security Strategy Guide

This information security guide provides guidance to organizations and auditors on assessing the level of security risks to the organization and evaluating the adequacy of the organization’s risk management.

Cyberinsecurity: The Cost of Monopoly

Is the dominance of Microsoft posing a risk to security? This paper argues that software monopoly has an additional cost: security vulnerability.

Pricewaterhouse Global Information Security Survey 2010

As global economic conditions continue to fluctuate, information security hovers in the balance caught between a new hard-won respect among executives and a painstakingly cautious funding environment. Signs of security’s strategic gains and advances stand side by side with newly emerging cracks in its foundation.

Cloud Computing Strategy: Measuring the Value of Transformation

This paper describes "a balanced and evolving set of metrics to help IT executives communicate objectives, measure progress, link IT efforts to business results, and demonstrate the strategic value of IT on their journey along the IT Value Transformation Road Map – a three-stage approach to using virtualization and cloud solutions to transform IT from a cost center to a strategic value driver."

Cloud Computing Strategy: Situational Awareness

This paper discusses identifying and assessing your organizations abilities on the five competencies for IT value transformation – a three-stage approach to using virtualization and cloud solutions to transform IT from a cost center to a strategic value driver. 

Introduction to Cloud Computing: Delivery and Deployment Models

This paper describes cloud computing, its main characteristics and the models that are currently used for both deployment and delivery. It examines the benefits and business issues with using the cloud, and how they can be addressed. It describes some of the early adapters of cloud computing, together with their

Are You Ready For the Cloud?

The cloud is ready. Is the CIO ready for the cloud? This paper contends that even though cloud computing is not perfect there are ways to overcome risks by "paying proper attention to vendor reputation, service-level agreements, and pricing schemes."

CIO Portal