Skip to Main Content
Select regional store:
Learn for less: Save 10% on high-quality foundation and auditor training. Find out more
Governance and Internal Controls for Cutting Edge IT

Governance and Internal Controls for Cutting Edge IT

SKU: 4185
Authors: Karen Worstell
Publishers: ITGP
Format: PDF
ISBN13: 9781849284530
Pages: 312
Published: 05 May 2013
Availability: Always Available
Format: ePub
ISBN13: 9781849284547
Published: 05 May 2013
Availability: Now Available

Governance and Internal Controls for Cutting Edge IT shows you how to manage the risks of adopting cutting edge technology for your business in the context of COBIT® 5 and related standards.

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account. Apply online today or call our training sales team on +1 877 317 3454.

Price: $31.99

IT security risks are constantly changing, so how do we stay ahead?

To remain competitive, we rely on being early adopters of new technologies—but there are inherent risks. As we implement these technologies, how do we manage the risks without hindering the progress of the business?

In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting-edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards.

This book will enable you to:

  • Optimize your resources by making the most of the potential benefits of, and being aware of the potential risks of, your IT provision
  • Improve your stakeholder relationships by enhancing your service management and delivery through the application of appropriate standards
  • Apply security and control methods that are suitable for your business
  • Maximize the opportunities that are presented by compliance legislation and regulations
  • Manage your data storage, data recovery, and data migration, particularly in the context of the Cloud
  • Ensure business continuity in the face of an incident, and implement strategies to cover the risk of business interruption when using the Cloud
About the author

Karen Worstell

Karen Worstell has worked in information security and risk management for more than 25 years in a range of business sectors. She is currently the Managing Principal of W Risk Group LLC, a professional services practice that enables organizations to manage risk and address myriad standards. Karen has held leadership roles on a number of advisory boards and is a respected writer on information security.

Customer reviews

This website uses cookies. View our cookie policy