Achieving Business Value in Information Security

Achieving Business Value in Information Security PDF Author: Torsten Kriedt
Publisher: diplom.de
ISBN: 3832460098
Category : Business & Economics
Languages : en
Pages : 103

Get Book Here

Book Description
Inhaltsangabe:Abstract: The beginning of the 21st century with the fear of the "Year 2000"-threat (Y2K) became a milestone for the "Information Age", a term coined for the post-industrial stage of leading countries [ ] when information and information technologies become the main strategic national resource which results in an avalanche growth of information dependence in all spheres of society and state activities. . In organisations the awareness of the dependence on information has led to corporate initiatives to treat information as an asset, which includes various efforts for its protection. Management trends such as "knowledge management" have identified "knowledge sharing" as a new means for achieving competitive advantage, thus promoting information to be disseminated. Due to an ever closer relationship with customers, suppliers and even competitors, organisations have expanded their "information network" outside of the original boundaries. The dualism of protection of information assets on the one hand and a free flow of information has been identified to become a challenge for organisations, described as [ ] how to satisfy this need to share information without exposing the organization to undue risk. . With the information society implying radical changes, the need to act has been accelerated by a new mindset reacting to the advent of "e-business". Information Security (InfoSec) is often mistaken to be a purely technical issue, handled by information system (IS) departments and used as a synonym for firewall, access controls, and encryption of e-mails. However, because of the risks involved for an organisation - including legal liabilities, loss of trust and severe financial damage - InfoSec needs to be a top management issue. Then again, although paying lip-service to treating information as an asset, top-management usually does not act upon it: the average InfoSec spending in the U.S. today is only 0.4 percent of an organisation s revenue. In the following work it will be shown that a new approach to and a new understanding of InfoSec is vital for organisations to excel in the challenges faced by the information environment of the 21st century. The key focus of this study is to link existing InfoSec approaches to the concept of business value by ensuring their strategic fit with the corporate objectives. The first part will provide a common foundation with an evaluation of the role of information for organisations, relevant trends [...]

Computers at Risk

Computers at Risk PDF Author: National Research Council
Publisher: National Academies Press
ISBN: 0309043883
Category : Computers
Languages : en
Pages : 320

Get Book Here

Book Description
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.

Measuring the Business Value of Cloud Computing

Measuring the Business Value of Cloud Computing PDF Author: Theo Lynn
Publisher: Springer Nature
ISBN: 3030431983
Category : Business & Economics
Languages : en
Pages : 125

Get Book Here

Book Description
The importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and Information Systems (IS) literature. However, emerging technologies such as the ever-changing complex area of cloud computing present new challenges and opportunities for demonstrating how IT investments lead to business value. Recent reviews of extant literature highlights the need for multi-disciplinary research. This research should explore and further develops the conceptualization of value in cloud computing research. In addition, there is a need for research which investigates how IT value manifests itself across the chain of service provision and in inter-organizational scenarios. This open access book will review the state of the art from an IS, Computer Science and Accounting perspective, will introduce and discuss the main techniques for measuring business value for cloud computing in a variety of scenarios, and illustrate these with mini-case studies.

The Art of Business Value

The Art of Business Value PDF Author: Mark Schwartz
Publisher: IT Revolution
ISBN: 1942788053
Category : Business & Economics
Languages : en
Pages : 163

Get Book Here

Book Description
Do you really understand what business value is? Information technology can and should deliver business value. But the Agile literature has paid scant attention to what business value means—and how to know whether or not you are delivering it. This problem becomes ever more critical as you push value delivery toward autonomous teams and away from requirements “tossed over the wall” by business stakeholders. An empowered team needs to understand its goal! Playful and thought-provoking, The Art of Business Value explores what business value means, why it matters, and how it should affect your software development and delivery practices. More than any other IT delivery approach, DevOps (and Agile thinking in general) makes business value a central concern. This book examines the role of business value in software and makes a compelling case for why a clear understanding of business value will change the way you deliver software. This book will make you think deeply about not only what it means to deliver value but also the relationship of the IT organization to the rest of the enterprise. It will give you the language to discuss value with the business, methods to cut through bureaucracy, and strategies for incorporating Agile teams and culture into the enterprise. Most of all, this book will startle you into new ways of thinking about the cutting-edge of Agile practice and where it may lead.

Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations PDF Author: Neelesh Ajmani
Publisher: Apress
ISBN: 148423099X
Category : Computers
Languages : en
Pages : 183

Get Book Here

Book Description
Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage. What You’ll Learn Discover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business case Determine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activities Choose ways in which progress toward achieving and sustaining secured business operations can be measured Understand best practices for organizing, planning, architecting, governing, monitoring, and managing secured business operations Create a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operations Use cases and potential case studies for various industries and business models Who This Book Is For Chief executive officers and their leadership team; chief operations officers; chief information officers and their leadership team; chief information security officers; business functional middle managers; and enterprise, solution, and information technology architects

Business Information Systems: Concepts, Methodologies, Tools and Applications

Business Information Systems: Concepts, Methodologies, Tools and Applications PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1615209700
Category : Computers
Languages : en
Pages : 2476

Get Book Here

Book Description
Business Information Systems: Concepts, Methodologies, Tools and Applications offers a complete view of current business information systems within organizations and the advancements that technology has provided to the business community. This four-volume reference uncovers how technological advancements have revolutionized financial transactions, management infrastructure, and knowledge workers.

Information Security Evaluation

Information Security Evaluation PDF Author: Igli Tashi
Publisher: EPFL Press
ISBN: 2940222533
Category : Computers
Languages : en
Pages : 216

Get Book Here

Book Description
Information systems have become a critical element of every organization's structure. A malfunction of the information and communication technology (ICT) infrastructure can paralyze the whole organization and have disastrous consequences at many levels. On the other hand, modern businesses and organizations collaborate increasingly with companies, customers, and other stakeholders by technological means. This emphasizes the need for a reliable and secure ICT infrastructure for companies whose principal asset and added value is information. Information Security Evaluation.

The Business Model for Information Security

The Business Model for Information Security PDF Author: ISACA
Publisher: ISACA
ISBN: 1604201541
Category : Technology & Engineering
Languages : en
Pages : 73

Get Book Here

Book Description


Information security economics

Information security economics PDF Author: Saèd El Aoufi
Publisher: The Stationery Office
ISBN: 9780117068728
Category : Language Arts & Disciplines
Languages : en
Pages : 276

Get Book Here

Book Description
This new title, 'Information Security Economics' explores the economic aspects of information security, whilst explaining how best to work with them, in order to achieve an optimized ROI on security investments. It considers ways in which information security metrics can be utilized to support security initiatives, and how requirements can be prioritized by organizations, in order to maximize returns within a commercial environment which may have limited resources. The author: establishes a foundation for understanding the broader field of information security economics; identifies key challenges that organisations face as regards the ever-increasing threat profiles involved in information security; illustrates the importance of linking information security with risk management; explores the economics of information security from a cost-benefit perspective; demonstrates how information security metrics can identify where security performance is weakest, assist management to support security initiatives, and allow performance targets to be achieved; establishes ways in which organisations need to prioritise information security requirements and controls, in order to maintain cost-effective deployment in a business environment which may have limited resources; and gives practical recommendations to help organisations to proceed with the economic evaluation of information security.

Information Security Management Metrics

Information Security Management Metrics PDF Author: CISM, W. Krag Brotby
Publisher: CRC Press
ISBN: 1420052861
Category : Business & Economics
Languages : en
Pages : 246

Get Book Here

Book Description
Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical. Information Security Management Metr