Extent: | 1 online resource (290 pages) |
---|---|
Type of publication: | Book / Working Paper |
Language: | English |
Notes: | Description based on publisher supplied metadata and other sources. IT COMPLIANCE AND CONTROLS: Best Practices for Implementation; Contents; Preface; Acknowledgments; Part 1: COMING OF AGE; Chapter 1: Operating in an Interconnected Universe; THE INTEGRATED UNIVERSE; GLOBALIZATION; EMERGING MARKETS: IMPACTS OF INDIA AND CHINA; INTEGRATION; SEAMLESS SUPPLY CHAINS; GOVERNMENTS GONE WILD; GLOBAL CITIZENRY; SUPERSIZED CHALLENGES; SUMMARY; ENDNOTES; Chapter 2: How Technology Enables the World Market; PROCESS IMPROVEMENTS; COLLABORATION ENHANCEMENTS; PROGRESSION OF NETWORKS AND DATA; MIRACLE OF CONNECTIVITY; ENDNOTES; Chapter 3: Importance of IT Controls VALUE: BEYOND "BECAUSE IT IS BEST"INFORMATION SECURITY; INFORMATION ASSURANCE; VALUE BEYOND REGULATORY MANDATES; IN THE END; ENDNOTES; Part 2: INFLUENCE AND EFFECTS; Chapter 4: Death of Siloed IT Strategy; IT CONTROLS PERMEATE BUSINESS OPERATIONS; AGILE TECHNOLOGY CONTROLS; BALANCING BUSINESS OBJECTIVES; ACTION STEPS; ENDNOTES; Chapter 5: A Regulated Environment; DEFINITION OF INTERNAL CONTROL; REGULATORY ACTIVITY AND INTERNAL CONTROLS; GLOBALIZATION OF REGULATIONS; CREDIT CARD INDUSTRY; THE ENERGY SECTOR; FINANCIAL INDUSTRY; LONGEVITY OF MANDATES; ENDNOTES Chapter 6: The World Is Your Oyster of Resources and GuidanceA WORLD OF RESOURCES AND GUIDANCE; SUMMARY; ENDNOTES; Chapter 7: Reality and Risks to IT Controls Being Effective; OVERVIEW; PERCEPTION BIAS; INHERENT CONTROL WEAKNESSES; PERSPECTIVES OF MANAGEMENT, AUDIT, AND IT; ENDNOTES; Part 3: IMPLEMENTATION; Chapter 8: Enterprise Risk Analysis; IDENTIFYING RISK-BASED CONTROLS; CONVERGE MANDATES; RISK-BASED CONTROLS: FILTER AND PRIORITIZE; RISK-BASED CONTROLS: CURRENT STATE; ENDNOTES; Chapter 9: Principle 1: Strategy Orchestration; PRINCIPLES OVERVIEW: CONCEPT AND APPROACH; GLOBAL PRINCIPLES PRINCIPLE 1: TECHNOLOGY STRATEGY ORCHESTRATIONENDNOTES; Chapter 10: Principle 2: Life-Cycle Management; OVERVIEW; ACQUIRE AND SUPPORT; APPLICATION CONTROLS: CORRECT PROCESSING; SOFTWARE DEVELOPMENT; CHANGE CONTROL; COMPLIANCE; ENDNOTES; Chapter 11: Principle 3: Access and Authorization; OVERVIEW; LOGICAL ACCESS; PHYSICAL ACCESS; HUMAN RESOURCES; COMPLIANCE; ENDNOTES; Chapter 12: Principle 4: Sustain Operations; OVERVIEW; OPERATIONS RESILIENCY; ENVIRONMENTAL SAFEGUARDS; COMPLIANCE; ENDNOTES; Chapter 13: Principle 5: Security and Assurance; OVERVIEW; RISK AWARENESS TRUSTED COMPUTING PLATFORM/SYSTEM CONTROLSTRUSTED COMMUNICATIONS AND NETWORK; MONITORING AND PERFORMANCE REVIEWS; INCIDENT RESPONSE CAPABILITY; COMPLIANCE; MONITORING AND PERFORMANCE REVIEWS; INCIDENT RESPONSE CAPABILITY; ENDNOTES; Part 4: LOOKING FORWARD; Chapter 14: This is Not the End; BRINGING IT ALL TOGETHER; FIVE PRINCIPLES; REFLECTION ON INFORMATION TECHNOLOGY INTERNAL CONTROLS; ENDNOTES; Chapter 15: Building a System of IT Compliance and Controls; GETTING STARTED; PITFALLS; OPPORTUNITIES; OBJECTS IN MIRROR ARE CLOSER THAN THEY APPEAR; OPTIMIZATION LONGEVITY AND VITALITY: THE NEXT 100 YEARS |
ISBN: | 978-0-470-24545-3 ; 978-0-470-14501-2 ; 0-470-14501-3 ; 978-0-470-14501-2 |
Source: | ECONIS - Online Catalogue of the ZBW |
Persistent link: https://www.econbiz.de/10012685073