Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipulate and transmit sensitive customer and financial information. IT, which involves major risks, may threaten the security if corporate information ass...
This paper looks at the development of a framework for information security risk assessments within ...
To ensure business continuity the security of corporate information is extremely important. Previous...
Examine the evolving enterprise security landscape and discover how to manage and survive risk. Whil...
AbstractThe growing emergence of information security threat call for information security to be int...
The corporate scandals of the last few years have changed the face of information security and its g...
The corporate scandals of the last few years have changed the face of information security and its g...
In today’s business environment, almost all information is captured and stored in electronic form. T...
In today's globally interconnected economy, information security has become one of the most complex ...
Information is a critical asset without which an organisation could not survive. The adequate and ef...
Information is a critical asset without which an organisation could not survive. The adequate and ef...
The concept of governance has an already old contour: the system by which business corporations are ...
Information has always been one of the most important assets a company possesses. Trade secrets, pat...
The corporate scandals of the last few years have changed the face of information security and its g...
Information technology (IT) security, which is concerned with protecting the confidentiality, integr...
MBA (Business and Leadership), North-West University, Mafikeng Campus, 2013This mini dissertation co...
This paper looks at the development of a framework for information security risk assessments within ...
To ensure business continuity the security of corporate information is extremely important. Previous...
Examine the evolving enterprise security landscape and discover how to manage and survive risk. Whil...
AbstractThe growing emergence of information security threat call for information security to be int...
The corporate scandals of the last few years have changed the face of information security and its g...
The corporate scandals of the last few years have changed the face of information security and its g...
In today’s business environment, almost all information is captured and stored in electronic form. T...
In today's globally interconnected economy, information security has become one of the most complex ...
Information is a critical asset without which an organisation could not survive. The adequate and ef...
Information is a critical asset without which an organisation could not survive. The adequate and ef...
The concept of governance has an already old contour: the system by which business corporations are ...
Information has always been one of the most important assets a company possesses. Trade secrets, pat...
The corporate scandals of the last few years have changed the face of information security and its g...
Information technology (IT) security, which is concerned with protecting the confidentiality, integr...
MBA (Business and Leadership), North-West University, Mafikeng Campus, 2013This mini dissertation co...
This paper looks at the development of a framework for information security risk assessments within ...
To ensure business continuity the security of corporate information is extremely important. Previous...
Examine the evolving enterprise security landscape and discover how to manage and survive risk. Whil...