TITLE

ON THE MEND

AUTHOR(S)
Stone, Adam
PUB. DATE
December 2005
SOURCE
Information Security;Dec2005, Vol. 8 Issue 12, p50
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on the launch of a comprehensive risk assessment and revamped security management system by Novartis AG. Michael Rasmussen, vice president of enterprise risk and compliance management research at Forrester Research, believes that the company's risk management reflects the change in the role of the security manager. Several security systems used by the company include the Kaizen platform and Security Tracking System. The initiative has provided Novartis the framework to comply with future laws and regulations.
ACCESSION #
19176277

 

Related Articles

  • Computer Security: Weaknesses Continue to Place Critical Federal Operations and Assets at Risk: GAO-01-600T. Dacey, Robert F. // GAO Reports;4/5/2001, p1 

    This testimony discusses GAO's analysis of security audits at federal agencies. The widespread interconnectivity of computers poses significant risks to federal computer systems and the operations and the infrastructures they support. GAO's evaluations show that federal computer systems are...

  • Economics And Technology. Krapf, Eric // Business Communications Review;Apr2007, Vol. 37 Issue 4, p4 

    The author reflects on the relationship between computer security services and economics. He argues that the technical means of computer security can only be effective if they're used in service of ends crafted at the business level. He also believes that the most important part of a computer...

  • Confronting the Emerging Threat. Moynihan, John F. // Internal Auditor;Oct2007, Vol. 64 Issue 5, p66 

    The article considers the role of auditors in helping their organization develop a multi-faceted approach to preventing information security breaches. Business organizations are forced to confront security breach because of the proliferation of data collection in various industries and sectors...

  • A Study on the Risk Evaluation Scheme based on the Probabilistic Analysis. Nam-Kyun Baik; Sung-Min Jung; Tae-Kyung Kim // Journal of Security Engineering;Apr2013, Vol. 10 Issue 2, p141 

    The information protection is valuable when it exists by needs of business. The advent of the ISMS(information security management system) is caused by the change of this business environment. Companies should try to manage their assets from external threat and risk. Risk analysis and assessment...

  • Net security experts share tips. Messmer, Ellen // Network World;3/26/2007, Vol. 24 Issue 12, p1 

    Information about the computer security issues and tips that was discussed during the InfoSec World Conference & Expo of security professionals in Florida is presented. These tips include risk minimization, selection of network access control and deployment of identity management technologies....

  • Layoff Protocol. Cohen, Jackie // InfoWorld;05/21/2001, Vol. 23 Issue 21, p63 

    Discusses how information technology (IT) managers should handle layoffs to protect the company's assets. Risk assessment issues IT management should conduct to prevent damage during layoffs; Proxicom's requirement in handling network access; Purpose of Boeing's termination checklist for...

  • A common-sense approach to secure remote connectivity. Russo, Jon // Siliconindia;Aug2004, Vol. 8 Issue 7, p20 

    Presents several approaches in securing remote connectivity. Importance of formulating security policies based on individual risk assessment of employees; Initiation of annual security policy audits; Management of passwords.

  • THE 5 STEPS OF A CYBERSECURITY RISK ASSESSMENT. Engel, Peyton // Risk Management (00355593);Oct2010, Vol. 57 Issue 8, p39 

    The article presents guidelines on how organizations can implement a successful cybersecurity risk assessment. Organizations should identify and locate information assets. They should also classify information assets by assigning a rating on the information asset list. Performing a threat...

  • Managing becomes complex. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Jun2011, Vol. 22 Issue 6, p33 

    The author talks about policy management and risk management used by the information security industry. He cites the role of risk analysis in devising policy. It explains how risks are managed by dealing with threats and vulnerabilities. He introduces information security management tools, some...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics