TITLE

Security Chiefs Want a Greater Say in Strategy

AUTHOR(S)
Kite, Shane
PUB. DATE
May 2004
SOURCE
Bank Technology News;May2004, Vol. 17 Issue 5, p43
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on the request of security chiefs to have greater roles in information security. Failure of corporate governance, executive commands and poor intraorganizational communication; Execution of security policies; Consideration of agenda for information technology operations; Authority of security officers.
ACCESSION #
13122711

 

Related Articles

  • Ownership Concentration, Top Management and Board Compensation. Pinto, Marcos Barbosa; Câmara Leal, Ricardo Pereira // RAC - Revista de Administração Contemporânea;mai/jun2013, Vol. 17 Issue 3, p304 

    The degree of ownership concentration may influence executive and board compensation (Bebchuk & Fried, 2003). This article analyzes this relationship. Detailed information about top management and board compensation became available starting in 2010 through new Securities Commission filings....

  • Corporate Managers' Experiences Related To Implementing Section 404 Of The Sarbanes-Oxley Act: A Focus On Information Systems Issues. Bryan, Lois D. // Journal of Applied Business Research;May/Jun2009, Vol. 25 Issue 3, p25 

    This article reports the experiences of corporate managers implementing the requirements of Section 404 of the Sarbanes-Oxley Act as it pertains to information systems. To carry out this research high ranking corporate managers were interviewed. Their firsthand experience with implementing the...

  • Infoglut Management Essential Change for the Global MegaCrisis. Marien, Michael // World Future Review (World Future Society);Fall2012, Vol. 4 Issue 3, p12 

    The article offers information on the growth of information overloading which can bring radical changes in business enterprises at the time of global mega crisis in market. It reports that business professionals should deal with infoglut problem arised from dysfunctional industrial era knowledge...

  • Growing Your Productivity. Dignan, Larry // Baseline;Oct2005, Issue 50, p8 

    This article discusses the process used in choosing the companies included in the Baseline 500. Baseline 500 aims to quantify not how well information systems work, but how well corporations manage information. According to Paul Strassmann, a former technology executive at Xerox and Kraft Foods,...

  • The Baseline 500.  // Baseline;Oct2005, Issue 50, p14 

    This section presents the 2005 Baseline 500, a list of the best managers of information collected from a database of public companies with sales above 100 million dollars.

  • A River Runs Through IT. Marinos, George // DM Review;Jan2005, Vol. 15 Issue 1, p22 

    This article presents the results of a survey which examined how executives around the world are addressing data management, as of January 2005. Most companies do not have a formal strategy. While 67 percent of respondents reported that their organization had a company-wide data strategy in...

  • Honeypot Protection Detection Response Recovery Model for Information Security Management Policy. Shubao Xing; Huifeng Xue; Gang Li // Asian Social Science;Dec2010, Vol. 6 Issue 12, p50 

    Focusing on characteristics of information management in SME that most information security models assign the detection function to the operational process of enterprise, this paper proposes an information security management model for SMEs ---- the HPDRR (Honeypot Protection Detection Response...

  • Building Risk Resilience. DURBIN, STEVE // Information Security;Jun2012, Vol. 14 Issue 5, p7 

    The author discusses security measures to deal with computer security threats and the challenges faced by business enterprises. He mentions various computer network threats including external threats, regulatory threats and internal threats. Several security measures are suggested including that...

  • Every cloud has a silver lining. Stagg, Richard // ComputerWorld Hong Kong;Oct2010, Vol. 27 Issue 8, p8 

    The author comments on the implications of cloud computing for information security management. The three trends cited which will impact the traditional role computer security professionals are cloud computing, mobile networks, and consumerization. The impact of consumerization on businesses is...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics