Skip to Main Content
Select regional store:
National Cyber Security Awareness Month | Save 15% on self-paced and staff awareness training courses | Use code NCSAM15
Governance and Internal Controls for Cutting Edge IT

Governance and Internal Controls for Cutting Edge IT

SKU: 4185
Authors: Karen Worstell
Publishers: ITGP
Format: Softcover
ISBN13: 9781849283762
Pages: 136
Published: 05 May 2013
Availability: In Stock
Format: Adobe eBook
ISBN13: 9781849284530
Pages: 312
Published: 05 May 2013
Availability: Always Available
Format: Adobe ePub
ISBN13: 9781849284547
Published: 05 May 2013
Availability: Now Available

Governance and Internal Controls for Cutting Edge IT shows you how to manage the risks of adopting cutting edge technology for your business in the context of COBIT® 5 and related standards.

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account. Apply online today or call our training sales team on +1 877 317 3454.

Price: $31.99


IT security risks are constantly changing, so how do we stay ahead?

To remain competitive, we rely on being early adopters of new technologies—but there are inherent risks. As we implement these technologies, how do we manage the risks without hindering the progress of the business?

In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting-edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards.

This book will enable you to:

  • Optimize your resources by making the most of the potential benefits of, and being aware of the potential risks of, your IT provision
  • Improve your stakeholder relationships by enhancing your service management and delivery through the application of appropriate standards
  • Apply security and control methods that are suitable for your business
  • Maximize the opportunities that are presented by compliance legislation and regulations
  • Manage your data storage, data recovery, and data migration, particularly in the context of the Cloud
  • Ensure business continuity in the face of an incident, and implement strategies to cover the risk of business interruption when using the Cloud

About the Author

Karen Worstell has worked in information security and risk management for more than 25 years in a range of business sectors. She is currently the Managing Principal of W Risk Group LLC, a professional services practice that enables organizations to manage risk and address myriad standards. Karen has held leadership roles on a number of advisory boards and is a respected writer on information security.

This website uses cookies. View our cookie policy