Integrated Security Architectural Framework

This whitepaper describes an integrated IT security framework developed by Cisco Global Government Solutions Group.


This integrated security architectural framework ties business processes to risk while identifying gaps in regulatory standards, industry standards, and security policy compliance. This framework provides decision makers with information that can be referenced to help prioritize projects while addressing security in a cost-effective manner. The framework additionally supports organizational survivability following a disaster by directly feeding quantitative risk data into business continuity management.

Business owners can quickly see the end-to-end relationships between the framework’s elements. Security practitioners can quickly show the risk addressed by each element and can measure each IT security service’s delivery across the framework.

Download Document: Documents are in common file formats such as Microsoft Word (doc), Powerpoint (ppt), Excel (xls,csv,xlsx), and Adobe pdf.
Download


Related Categories




Related Topics




Related Articles


5 Key Principles of Data Security

This quick guide to data security for businesses discusses 5 key principles to stay away from trouble.

A Guide to Virtualization Security

A practitioner's perspective on virtualization security issues and solutions.

Cloud Computing Governance

This presentation discusses security, governance, risk, and compliance in the cloud and recommends a course of action for cloud computing governance.

Cloud Computing Security

In this paper we will explain why trust, reliability and security decisions are central to choosing the right model for cloud computing.

Cloud Computing: Security, Governance and Assurance Perspective

 This paper provides an overview of cloud computing and discusses potential business benefits, risks and assurance issues.

Cyberinsecurity: The Cost of Monopoly

Is the dominance of Microsoft posing a risk to security? This paper argues that software monopoly has an additional cost: security vulnerability.

Deloitte Global Security Survey

This excellent study done by Deloitte highlights the growing issues with information security - the threats are increasing as companies are slowing their investments.

European CIO Cloud Survey

This report is based on a survey of 500 CIOs, in a cross-section of organizations across Europe, to explore current attitudes and adoption levels of cloud computing.

Executive's Handbook of Information Security

This guide provides in-depth introduction to the key issues surrounding information security in the digital age, highlights the impact of these issues, and recommends risk mitigation strategies to anticipate, and avoid losing business value because o...

Global Information Security Survey (2010)

As organizational boundaries vanish, so does the traditional information security paradigm. This survey of over 1600 participants from 56 countries highlights the information security challenges facing organizations today and how they are managing t...

Global State of Information Security Survey (PwC) (2011)

This presentation discusses the key findings from PricewaterhouseCoopers 2011 Global State of Information Security Survey - "In the aftermath of the worst global economic jolt in 30 years, information security confronts a new economic order: Respect...

Hacking 101

This presentation describes the key vulnerabilities in web applications and discusses how to protect against the next attack.

Hybrid Web Security

 Security threats and solutions for both Cloud Computing and On-premises environment.

Identity Management in Health IT

This presentation discusses the imperatives for identity and access management in health information technology.

Information Technology Security

This study provides a framework to compare and assess information security governance, strategy, investment, and practices with other organizations using the ISO/IEC 17799 framework for security standards as a guide. The study was done for instituti...

Is The Cloud More Secure Than a Physical Environment?

Virtualization Security

  Virtualization Security describes the issues and possible solutions to deal with security vulnerabilities in a virtualized environment.

Virtualization Security Strategy

This white paper discusses a coordinated approach for intrusion detection and prevention in a virtualization environment. 

When Disaster Planning Fails

This article takes the example of Northrop Grumman's experience due to hurricane Katrina - when its disaster planning failed and cost the company $1B - to discuss creating disaster recovery plans, assessing preparedness, and recovering after a disas...




Posted on 10/11/2011 by


Integrated Security Architectural Framework author sourabhhajela

sourabhhajela




Signup For ThoughtLeader









Subscribe


CIO Index

Our Focus is On Your Agenda

CIO Index is the world's largest professional network for CIOs - of the CIO, for the CIO, by the CIO. 

Over 70,000 CIOs and other IT Executives use CIO Index to Learn, Network and Share.

 

Cioindex, Inc.

  • (+1) 800-309-3550
  • Mon - Fri 9:00am - 5:00 pm
  • 115 Franklin Tpke, Mahwah, NJ 07430