About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
Information Security | Storage | Wireless and Mobile | Editorials | IT Insight
Articles > IT Insight
Managing Risks in IT Operations
By Sameer Wadhwa, Ravikant Karra
Friday, 7 October 2005 07:53 EST


These are challenging times for CIOs. Increasing influence of IT on the way business is conducted and various regulations such as Sarbanes Oxley and Basel II have put the focus back on effectively managing risk in IT operations.

Adding to the challenge is the environment of cost rationalization, where organizations need a comprehensive IT risk management framework to justify the risk mitigation against the costs incurred to mitigate the risk. It is imperative that managing IT risk be given the same importance in terms of time and resources as managing any business risk.

This enhanced focus on risk and associated internal controls has lead organizations to focus on business processes and the identification of their inherent risks. However, processes are inextricably linked to IT applications which either support or interface with them.

Evaluating controls to mitigatbusiness process risks cannot be complete without assessing controls within the applications that enable those business processes. Moreover, certain IT risks like unauthorized access, inappropriate segregation of duties and application security reviews are common across business processes.

This calls for a two-level assessment of IT risks: a “horizontal controls assessment” or a review of common IT processes followed by an application specific or “vertical controls assessment”. At each level, organizations should identify risks, assess risks and take corrective action to reduce the impact of risks.

Read the full paper in PDF format here


What's up, IT? Blog

Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year
Symantec Readies Urgent Patch
Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.





Copyright © IT-Observer.com 2000 - 2005    Privacy Policy | RSS Feeds
Site Meter