TITLE

Drawing a New Battle Plan for Conquering Key Information Risks

AUTHOR(S)
Gatewood, Brent; Kain, John; Montaña, John C.
PUB. DATE
March 2012
SOURCE
Information Management Journal;Mar/Apr2012, Vol. 46 Issue 2, p35
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article discusses planning for dealing with key information risks in an organization. Decentralization of data in an roganization has led to risk exposure of confidential data, a challenge which needs to be dealt with very carefully. In addition, the current regulations and legal practices that assume records are discrete, bounded, stand-alone objects also require an organization to know the location of all its records. An organization needs to keep an eye on the pace of technology in order to safeguard its data against various threats.
ACCESSION #
75899253

 

Related Articles

  • Information Availability as Driver of Information Security Investments: A Systematic Review Approach. Dang, Duy; Nkhoma, Mathews // Proceedings of the European Conference on Information Management;2013, p71 

    Despite that information security issues have started to gain managers' attention since computers were first put in use, information security management has not yet reached its maturity and is still requiring input from both the academia and industry. Indeed, today's businesses have still not...

  • Reducing Risk Through Records Management. Bieri, Gregg // Risk Management (00355593);Dec2012, Vol. 59 Issue 10, p8 

    The article focuses on the importance of implementing a records management program in the organization. A records management program can protect an organization from significant risks including compliance issues, disaster recovery, and public relations crises as well as confidentiality breaches...

  • USING DATA PROFILING TO MITIGATE 7 'RED FLAG' INFORMATION RISKS. McGann, Jim // Information Management Journal;Jul/Aug2013, Vol. 47 Issue 4, p34 

    The article focuses on the use of data profiling to help organizations control costs and risks, and mitigate the seven greatest issues on their electronic records systems. The profiling process starts with the determination of greatest threats to compliance issues, data breaches, and bloated...

  • Why METADATA Matters. Franks, Pat; Kunde, Nancy // Information Management Journal;Sep/Oct2006, Vol. 40 Issue 5, p55 

    The article introduces basic metadata concepts and explains its role in resources and information management. It infers that the need for record managers to be involved in the development and design of metadata structures to ensure that digital records are captured, preserved or destroyed...

  • European businesses facing surging volumes of information.  // Information World Review;7/4/2013, p1 

    The article discusses the findings of the 2013 Information Risk Maturity Index from information management services firm Iron Mountain and PricewaterhouseCoopers (PwC), which found that mid-sized companies in Europe are not fully prepared to address the increasing volumes of information. It...

  • Errors & omissions.  // Business Insurance;5/30/2005, Vol. 39 Issue 22, p24 

    The article presents a chart of the largest bundled risk management information systems that was inadvertently omitted from the May 23, 2005 Spotlight report on Risk Management: New Technology & Online Solutions, which included rankings of RMIS vendors.

  • IT Risk Is Business Risk. Gill, Mike // COBIT Focus;2012, Vol. 2012 Issue 2, p10 

    The article discusses topics on information technology (IT) risk management and its implications to business enterprises. It is stated that most people in an organization treat IT risk management as an insignificant factor on business operations and governance models. On the other hand, the...

  • Guest Editorial - Life is less risky…or is it?  // Asia Insurance Review;Feb2011, p3 

    The article presents the author's views on the Enterprise Risk Management (ERM). He comments that rather than just relying on the state, individuals still need to be responsible for their own safety. He remarks that the control of many risks has been improved substantially with the...

  • Trends in IT Security Threats.  // Computer Economics Report;Apr2007, Vol. 29 Issue 4, p1 

    The article presents a high-level summary of a new special report on trends in information technology (IT) security threats. These had been describe in 12 categories along with the perceived seriousness of each category and how the threat level has changed. The defenses of IT security...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics