IT Risk Management: Planning Cost-effective Mitigation of Risks to IT Services

Organizations vary in the immediacy of their vulnerability to IT failures. Some start losing money the moment that a critical system becomes unavailable while others may be able to carry on with a near-normal operation for a considerable time. However, ultimately any substantial business is dependent on IT services. This means that any business should be able to determine the costs (both direct and indirect) of the different types of IT failure, and to plan an appropriate, cost-effective response to IT risks.

IT Risk Management Report reveals:

  • Why IT Risk Management should have a senior executive sponsor and a formal hierarchy of roles and responsibilities.
  • How protection of information against loss, corruption, or misuse has become an issue of public awareness as well as legal liability.
  • Why IT Risk Management should be designed into IT projects rather than added as an afterthought.
  • Why a business continuity plan should have its budget protected from other resource demands.

If you wish to read more you can purchase this title online.  

Alternatively, you can download the order form here

Report Information:

Published: December 2008

List Price: $2,995 USD

Publisher: Butler Group

Table of Contents 

Related Research:

Enterprise Web 2.0: Building the Next-generation Workplace 

IT Strategy and Architecture: Creating an Enterprise Model to Support IT Strategic Planning







Advertisement

How to Prevent Insider Threats!

POLL

More in Research

2013 eBook on surviving SIEM

2013 eBook on surviving SIEM

Protecting mission-critical systems against cyber attacks has become a national priority for government, critical infrastructure and military sites, and a business priority for corporations.

2013 eBook on cyber espionage

2013 eBook on cyber espionage

Nation-states can now skip over costly and time-consuming R&D by stealing corporate and government data and turning that information into a competitive advantage.

2013 eBook on Advanced Persistent Threats

2013 eBook on Advanced Persistent Threats

APTs - most often taking the form of cyber criminal campaigns out for financial gain or trade secrets - have impacted some of the largest organizations and government agencies in ...