Information Technology Reference
In-Depth Information
risk management, risk mitigation, effect on the bottom line, and ROI. To get to
these answers, there must be an alignment of IA mechanisms with the business
drivers behind them. IA 2 provides a methodology to discern, record, track, and
report this alignment. Easy? No. Quick? No. Necessary? Yes, to prove the initial
and ongoing business value of IA.
On the other hand, the devil is in the details. Someone, somewhere, somehow
must deal with the intricacies of the IA mechanisms to get them to work. This
chapter barely touches on the immense quantity of details involved in securing a
technical environment. No one individual can know it all. It takes a team of tech-
nology, security, and business professionals to identify potential risks, prioritize
relevant risks, and address those risks with available time, resources, knowledge,
and budget.
Search WWH ::




Custom Search