TITLE

The Top 5 Risks to Organizations

PUB. DATE
May 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p14
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents the top five security risks to an organization including the information technology department, the regulations and compliance, as well as the crisis management sector.
ACCESSION #
50938555

 

Related Articles

  • Calculating Risks. Classe, Alison // Accountancy;Dec2001, Vol. 128 Issue 1300, p56 

    This article explains how companies can align their overall business strategy with information technology (IT) security policies. The application of risk management techniques to IT is an increasingly common approach, and one designed to enable the business decision-makers to tackle IT security...

  • Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches. Ramona, Stroie Elena // Chinese Business Review;Dec2011, Vol. 10 Issue 12, p1106 

    Due to rapidly development of information systems, risk and security issues have increased and became a phenomenon that concerns every organization, without considering the size of it. To achieve desired results, managers have to implement methods of evaluating and mitigating risk as part of a...

  • eGestalt: Unifying IT Security and Compliance Management.  // Siliconindia;Nov2010, Vol. 13 Issue 11, p39 

    The article focuses on the "Secure GRC" information technology (IT) Security and Compliance management software solution from eGestalt Technologies. It says that the software, a cloud-based automated solution, covers all aspects of security and IT-Governance, Risk Management, and Compliance...

  • Taking Control of Information Security - A How-To Guide for Law Firms. Alsinawi, Baan // Law Practice Today;May2011, p7 

    The article offers suggestions for information security for law firms in the U.S. It is mentioned that the importance fundamentals of risk management include identification of risky areas, categorize information types and maintain information classification. Also, it is importance to have...

  • A host with the mostest? Mather, Tim // SC Magazine: For IT Security Professionals (UK Edition);Jun/Jul2009, p19 

    The article addresses host-level considerations that information security (IS) professionals should be thinking about with the use of public cloud computing. To assess the risks of model cloud service, users should factor the context of cloud computing service models. The similarities and...

  • A Framework for Internal Fraud Risk Reduction at IT Integrating Business Processes: The IFR2 Framework. Jans, Mieke; Lybaert, Nadine; Vanhoof, Koen // International Journal of Digital Accounting Research;2009, Vol. 9 Issue 1, p1 

    Fraud is a million dollar business and it is increasing every year. Both internal and external fraud present a substantial cost to our economy worldwide. A review of the academic literature learns that the academic community only addresses external fraud and how to detect this type of fraud....

  • Crashing Cars and Firewall Management – a similar chain reaction. Mecleod, Calum // Database & Network Journal;Mar2009, Vol. 39 Issue 2, p21 

    The article presents the author's views and recommendations regarding risk management and information technology (IT) security. It suggests the use of automated assessment tools to avoid data failure and adhere to information security policy. It also notes that risk assessment lessens cost, time...

  • Professional Monitor. Colley, John // SC Magazine: For IT Security Professionals (UK Edition);Jul/Aug2010, p82 

    In the article, the author discusses the latest developments in the information security industry as of July 2010. He cites the move to make information technology (IT) security as the top priority of businesses. He presents the joint project between the firms (ISC)2 and PwC involving the...

  • Calculating Risks. Classe, Alison // Accountancy;Dec2001, Vol. 128 Issue 1300, p56 

    This article explains how companies can align their overall business strategy with information technology (IT) security policies. The application of risk management techniques to IT is an increasingly common approach, and one designed to enable the business decision-makers to tackle IT security...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics