Cover image for IT compliance and controls : best practices for implementation
Title:
IT compliance and controls : best practices for implementation
Personal Author:
Publication Information:
Hoboken, NJ. : John Wiley & Sons, 2008
Physical Description:
xiv, 274 p. : ill. ; 23 cm.
ISBN:
9780470145012

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010175862 HD30.2 D45 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

IT Compliance and Controls offers a structured architectural approach, a 'blueprint in effect,' for new and seasoned executives and business professionals alike to understand the world of compliance'from the perspective of what the problems are, where they come from, and how to position your company to deal with them today and into the future.


Author Notes

JAMES J. D E LUCCIA IV, CIA, CISA, CISSP, enables organizations to leverage information, technology, and control environments to create competitive advantage and optimize business performance. A recognized expert on risk management, security, and compliance, he provides assurance and advisory services to companies worldwide. DeLuccia, an architect and contributor for international standards and frameworks, provides regular contributions to the PCI and compliance body of knowledge. He holds dual bachelor degrees in information systems and risk management, and an MBA in finance.


Table of Contents

Prefacep. ix
Acknowledgmentsp. xiii
Part 1 Coming of Age
Chapter 1 Operating in an Interconnected Universep. 3
Chapter 2 How Technology Enables the World Marketp. 19
Chapter 3 Importance of IT Controlsp. 29
Part 2 Influence and Effects
Chapter 4 Death of Siloed IT Strategyp. 37
Chapter 5 A Regulated Environmentp. 45
Chapter 6 The World Is Your Oyster of Resources and Guidancep. 61
Chapter 7 Reality and Risks to IT Controls Being Effectivep. 71
Part 3 Implementation
Chapter 8 Enterprise Risk Analysisp. 83
Chapter 9 Principle 1: Technology Strategy Orchestrationp. 113
Chapter 10 Principle 2: Life Cycle Managementp. 139
Chapter 11 Principle 3: Access and Authorizationp. 167
Chapter 12 Principle 4: Sustain Operationsp. 187
Chapter 13 Principle 5: Security and Assurancep. 201
Part 4 Looking Forward
Chapter 14 This Is Not the Endp. 239
Chapter 15 Building a System of IT Compliance and Controlsp. 249
Supportive Publicationsp. 263
List of Acronymsp. 269
Indexp. 271