REGISTER

email 14 48

com/?s=1357&e=0&t=977&f=imagemaparrayclick&i=0&l=0">




April 15, 2009
Provided as a service to our members to give them the chance to obtain the latest industry white papers. Click on the individual links to download white papers of interest.









Contoural is a leading independent provider of business and technology consulting services focused on litigation readiness, compliance, information and records management, and data storage strategy. Contoural helps clients address the emerging business requirements around data. For example, electronic discovery rules - under the new Federal Rules of Civil Procedure - now require US companies entering litigation to know what electronically stored information they have, where it is stored, and how quickly they can retrieve it. Similarly, legal and regulatory compliance requirements - under emerging privacy laws - are motivating enterprises to take a closer look at the integrity and security of electronic document files and other digital data. www.contoural.com

corp_int

Corporate Integrity, LLC is a strategy & research advisory firm providing education, research, and analysis on enterprise governance, risk management, and compliance. Through ongoing research, interactions and analytics Corporate Integrity is the authority in understanding how
organizations can foster a culture that "walks the talk" - where integrity is central to governance, risk and compliance (GRC) practices. Corporate Integrity educates organizations and GRC professionals within those organizations on achieving sustainability, consistency, efficiency, and transparency in their corporate GRC practices to maintain a position of integrity aligned with corporate values and business performance.
www.corp-integrity.com


kcp_logo

Kuppinger Cole + Partner (KCP), founded in 2004, has become the leading Europe-based analyst company for all topics around Identity Management and Digital Identities. KCP stands for expertise, thought leadership, and a vendor-neutral view on the broader "identity market", including aspects like classical Identity and Access Management (IaM), Information Rights Management (IRM), Identity Risk Management, Digital Certificates, Cards and Tokens, Single Sign-On, Auditing, Federation, User Centric Identity Management and Identity 2.0, and many more.

www.kuppingercole.com


 sccelogo

SCCE is a non-profit membership organization serving more than 1300 corporate compliance and ethics officers globally. We champion ethical practice and compliance standards and are dedicated to improving the quality of corporate governance, compliance and ethics. Visit www.corporatecompliance.org to learn more about how we can help you improve your program, deepen your knowledge base and become a Certified Compliance and Ethics Professional. 


logo_aberdeen

AberdeenGroup is the leading provider of fact-based research focused on the global technology-driven value chain. Founded in 1988, Aberdeen has established the market leading position as the "voice that matters" when it comes to understanding the measurable results being delivered by technology in business.

www.aberdeen.com

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Forrester's Business Technographics® November 2004 United States SMB Benchmark Study found that enterprises spend an average of 4.9% of revenues on IT. In 2005, we expect IT budgets to grow 7% over last year.1 IT is now at the core of most organizations' ability to execute strategy. Recent legislation, such as the Health Insurance Portability and Accountability Act (HIPAA) and Sarbanes- Oxley (SOX), have elevated demands for improved compliance and risk management across the enterprise, and on IT organizations specifically. The result is a "perfect storm" of pressure on CIOs and their IT organizations for better IT governance.

IT Governance Defined:

At its most basic definition, IT governance is the process by which decisions are made around IT
investments. How decisions are made, who makes the decisions, who is held accountable, and how the results of decisions are measured and monitored are all parts of IT governance. Based on this definition, everyone has some form of IT governance. Unfortunately for many firms, the governance process is ad hoc and informal. There is no consistency across the enterprise, accountability is weak - if present at all - and there are no formal mechanisms to measure and monitor the outcomes of the decisions.

There is just too much at stake today for organizations to leave IT governance to chance or legacy processes. Optimizing IT investments must become a priority. There is a growing trend on the part of large organizations to elevate IT performance to the board of directors level. In addition to the traditional audit committee and compensation committee, boards are adding an IT oversight committee to become more involved in the role that IT plays in enabling and executing the enterprise's strategy. For example, FedEx has established the Information Technology Oversight Committee to oversee major IT-related projects and technology architecture decisions.

Such executive commitments are only natural. IT governance can not exist in isolation but must
be a subset of enterprise governance. It is the responsibility not just of IT management but of
the board of directors and executive management. According to the IT Governance Institute,
IT governance "is an integral part of enterprise governance and consists of the leadership and
organizational structures and processes that ensure that the organization's IT sustains and extends the organization's strategies and objectives."

Implementing good IT governance requires a framework based on three major elements:

Structure, Who makes the decisions? What structural organizations will be created, who will take part in these organizations, and what responsibilities will they assume?
Process. How are IT investment decisions made? What are the decision-making processes for proposing investments, reviewing investments, approving investments, and prioritizing investments?
Communication. How will the results of these processes and decisions be monitored, measured, and communicated? What mechanisms will be used to communicate IT investment decisions to the board of directors, executive management, business management, IT management, employees, and shareholders?
ESTABLISHING A FOUNDATION:

With a working definition of good IT governance at hand, the next step is to establish a foundation on which to build an IT governance framework. The foundation consists of three parts:
understanding the governance maturity, knowing how structural issues impact governance, and
understanding the four objectives of IT governance.

IT Governance Maturity:

Forrester recommends that organizations in the process of developing or evolving their current IT governance framework conduct an IT governance maturity assessment. Understanding where you are is extremely helpful in trying to formulate an IT governance strategy. Forrester's IT Governance Maturity Model is comprised of four stages:


Stage 1: Ad hoc. There are no formal IT governance processes, and it's not recognized by management as being a necessity. IT investments are made on a completely ad hoc basis. This scenario is almost always found in highly decentralized organizations, but it is not limited to them.
Stage 2: Fragmented. Here there is an attempt to formalize IT governance processes but on a fragmented basis. These formalized processes may exist in one or more business units and IT decisions within those business units may be optimized, but there is no enterprisewide effort to coordinate investment decisions or examine tradeoffs between business units or enterprisewide investments versus BU investments.
Stage 3: Consistent. At the third level of maturity, IT governance processes have been consistently applied across the enterprise. All business units/entities conform to the same set of IT governance processes. IT investment decisions are based on the enterprise view.
Stage 4: Best practices. At the fourth level of maturity, IT governance processes are fully evolved and optimized across the enterprise. A strong IT portfolio management process is in place to ensure that all IT investment decisions are themselves optimized, the CEO and executive team are active participants in the governance process, and IT strategy is part of the enterprise strategy.
Structural Issues In IT Governance:

Any attempt at developing and enforcing IT governance requires an understanding of the
structural, or organizational, pieces of the framework. Forrester has identified four major types of IT organizational structures. These four include: centralized, decentralized, federated, and projectbased organizations. Each organizational structure presents a different challenge in implementing IT governance as characterized by its decision-making process.


In a centralized IT organization, all IT decision-making and the IT budget are in one place, they are much easier to manage and require much less effort to organize. The CIO can take the lead in developing the governance processes and work directly with the CEO and executive team. The challenge for centralized IT organizations is to refrain from becoming a monarchy and to ensure that business units and operating groups have a voice in the process.
Decentralized organizations most often reach the fragmented stage because each decentralized IT function has developed its own IT governance processes, but there are no formal processes across business units or between business units and corporate. IT investment decisions may be optimized at the business unit level, but they are not optimized across the enterprise. This often results in duplicated infrastructure and applications, and little sharing of systems or expertise, if any. The challenge is to develop an enterprisewide IT governance process that enables the organization to make tradeoffs.
These are hybrid organizations that have both centralized and decentralized components. Most infrastructure and enterprisewide applications are centralized in a corporate IT organization and operated as a shared service with chargebacks, while business units retain control over BU-specific applications and development resources. This attempts to create the best of both worlds: centralized control for reduced costs, with applications development left with the business units where it can be more responsive. The challenge for federated IT organizations is to balance the needs of the business units for infrastructure investments and to conform to an enterprise architecture and standards.
Project-based. Project-based IT organizations are a relatively new phenomenon and take
their lead from professional services firms. They are a form of centralized IT in that all IT
resources are centrally located and report into a corporate CIO, but they differ mostly in the applications development area. Rather than the traditional applications development group, an organizational structure is built around resource pools, often called competence centers, consisting of like resources. Also the traditional line manager is replaced in favor of a resource manager or competence center manager who heads up each resource pool. This new role's performance is measured on resource utilization and the ability to loan out qualified staff in sufficient quantity as required by the project portfolio and pipeline. For project-based IT organizations to be effective, they need a strong governance mechanism in place to ensure that the right projects are selected and funded. The challenge, then, in project-based organizations is the process around the project selection, funding, and prioritization process.
The Four Objectives Of IT Governance:

There are four objectives that drive IT governance: IT value and alignment, accountability,
performance measurement, and risk management. Each of these objectives must be addressed as part of the IT governance process.

 


IT value and alignment. One of the primary goals of IT governance is to ensure alignment between the business units and IT. By creating the necessary structures and processes around IT investments, management can ensure that only those IT projects that are aligned with strategic business objectives are approved, funded, and prioritized. Furthermore, alignment also deals with balance between investments that run the current business, grow existing businesses, and have the potential to transform the business, while delivering IT value by managing projects that are on time, on budget, and deliver expected results. Delivering value to the business typically means things like growing revenues, improving customer satisfaction, increasing market share, reducing costs, and enabling new products and/or services.
Risk management. With more of an organization's value proposition built on IT, risks associated with IT are often the same as risks to the business. Therefore, managing IT risk is paramount. IT risks include security risks arising from hackers and denial of service attacks, privacy risks arising from identity thefts, recovery from disasters, resiliency of systems from outages, and the risks associated with project failures.
Accountability. At the end of the day, governance is about accountability. The Sarbanes-Oxley legislation is intended to hold senior executives accountable for the integrity and credibility of their financial information and controls. IT governance holds IT management accountable for the return on its investment in IT, as well as the credibility of IT's own information and controls.
Performance measurement. Accountability in IT governance requires that you keep score, typically by implementing a form of balanced scorecard. The IT Balanced Scorecard consists of four perspectives: IT Value, User, Operational Excellence, and Future Orientation. Two of these perspectives contain measures for the two key governance objectives: IT value and risk management. The IT value perspective contains specific measures for IT/business alignment and IT value, while the operational excellence perspective contains specific measures for managing IT risk.
EXISTING FRAMEWORKS:

While there is no single, complete, off-the-shelf IT governance framework, there are a number of frameworks available that can serve as useful starting points for developing a governance model. As a result, most IT organizations today are "rolling their own" models, but borrowing heavily from existing frameworks. Most of the existing frameworks are complementary, with strengths in different areas, and so, a mix-and-match approach is often taken. Three of those frameworks are discussed in more depth below.

COBIT:

Control Objectives for Information and related Technologies (COBIT) was developed in 1996 by
the Information Systems Audit and Control Association (ISACA) and is now issued and maintained by the IT Governance Institute (ITGI) as a framework for providing control mechanisms over the information technology domain.4 Now in its third edition, COBIT has been extended to serve as an IT governance framework by providing maturity models, critical success factors, key goal indicators, and key performance indicators for the management of IT.
At the heart of COBIT are 34 high-level control objectives. These control objectives are grouped
into four main domains: planning and organization, acquisition and implementation, delivery
and support, and monitoring. Corresponding to each of the 34 control objectives are 318 detailed
control objectives (see Figure 4).

Planning and organizing. This domain covers a whole range of topics. Included are the strategy and tactics used by IT to achieve business objectives, strategy planning, strategy communication, strategy management, risk management, and resource management, which insures that the required technology infrastructure and human capital are in place.
Acquisition and implementation. For IT to realize its strategy, it must identify, develop or acquire, and implement solutions to business processes. Additionally, it must manage the life cycle of existing systems through maintenance, enhancements, and retirements.
Delivery and support. On its most basic level, IT delivers services to its customers (users). This domain concerns service and support issues including performance and security, and it also includes training.
Monitoring. All IT processes need to be regularly assessed for their quality and compliance with control requirements. The monitoring domain addresses management's oversight of the organization's control processes.


More recently, COBIT added a set of action-oriented management guidelines to provide management direction for monitoring achievement of organizational goals, for monitoring performance within each IT process, and for benchmarking organizational achievement.

Overall, COBIT represents a comprehensive framework for implementing IT governance with a
very strong auditing and controls perspective, which has increasing resonance in the era of Sarbanes-Oxley and other compliance-related regulations and legislation.

ITIL:

The IT Infrastructure Library (ITIL), initially developed in the UK by the Office of Government
Commerce (OGC), is gaining traction in the global IT community as a framework for IT governance.5 The library currently consists of eight books, including: "Software Asset Management," "Service Support," "Service Delivery," "Security Management," "Application Management," "ICT Infrastructure Management," "The Business Perspective," and "Planning to Implement Service Management" (see Figure 5). ITIL is focused on identifying best practices in regards to managing IT service levels and is particularly process-oriented.


"Planning to Implement Service Management." This book deals explicitly with the question of where to start with ITIL. It outlines the steps necessary to identify how the organization would benefit from ITIL. It helps identify current strengths and weaknesses and gives practical guidance on the evaluation of the current maturity levels of service management within the current organization.
"The Business Perspective." "The Business Perspective" is designed to familiarize business management with the architecture and components of information and communications technology (ICT) -infrastructure required to support the business processes. The book helps business leaders better understand the benefits of best practices in IT service management.
"Software Asset Management." This book encompasses the entire infrastructure and processes necessary for the effective management, control, and protection of the software assets within an organization, throughout all stages of their life cycle.
"Service Support." "Service Support" focuses on ensuring that the customer has access to appropriate services to support their business functions. It covers configuration management and other support management issues including incident, problem, change, and release management.
"Service Delivery." "Service Delivery" covers the service the business requires of IT to enable adequate support to the business users. This includes processes for service-level management, availability management, capacity management, financial management for IT services, and continuity management.
"Security Management." The security management book of ITIL looks at security from the service provider perspective, identifying the relationship between security management and the IT security officer, as well as outlining how it provides the level of security necessary for the entire organization. It further focuses on the process of implementing security requirements identified in the IT service level agreement.
"ICT Infrastructure Management." This covers all aspects of infrastructure management from identification of business requirements to acquiring, testing, installation, and deployment of infrastructure components. It includes the design and planning processes, deployment processes, operations processes, and technical support processes.

 


"Application Management." "Application Management" addresses the complex subject of managing applications from initial business requirements through the application management lifecycle, up to and including retirement. A strong emphasis is placed on ensuring that IT projects and strategies are tightly aligned with those of the business throughout the applications life cycle. Once an application is approved and funded, it is tracked throughout its life cycle by the software asset management function of ITIL.
While COBIT takes the perspective of audit and control, ITIL takes the perspective of service
management. The two frameworks are more complementary than competitive and components of both can be taken to build a governance framework.

ISO 17799:

The International Organization for Standardization has developed the third major governance
framework, ISO 17799, titled "Information Technology - Code of Practice for Information Security Management." It was first released by the ISO in December 2000. However, it is based on British Standard 7799, which was finalized in 1999. The intent of the standard is to focus on security and aid an organization in the creation of an effective IT security plan.

The standard has the following high-level groupings: security policy, organizational security, asset classification and control, personnel security, physical and environmental security, communications and operations management, access control, systems development and maintenance, business continuity management, and compliance. The standard is very thorough and covers a great deal of material in a concise manner.

ISO 17799's relatively narrow focus on security makes it unsuitable as the sole basis for an IT
governance framework, but since risk management is a component of IT governance, there is
relevance to ISO 17799, and parts of it can be adopted in building an overall IT governance
framework.

CONSTRUCTING YOUR FRAMEWORK:

The first three sections of this report laid the groundwork for developing an IT governance
framework. There is not necessarily one right IT governance framework. Governance frameworks must work within the context of an organization's structure, culture, and strategy. Every IT governance framework must address three things: governance structures (the who of IT governance), governance processes (the how of IT governance), and governance communications to measure and communicate performance of the overall IT governance effort. Each of these is described in more detail below.

Governance Structures:

Governance structures relate to the organizational mechanisms created around the IT investment process. They include reporting relationships, governance-specific positions, and committees either created especially for or repurposed to execute the governance processes. Examples of governance structures include the following:


Reporting relationships. One of the more effective IT governance structures consists of the CIO reporting to the CEO. This ensures that IT is part of the executive team where most strategy discussions begin and end. Without this seat at the table, IT will almost always be limited to a support organization as opposed to an enabling organization.
Governance-specific positions. Some large IT organizations are actually creating the position of IT governance officer reporting to the CIO. This sends a strong message that IT governance is important and it provides a continual focus on the issue. It prevents IT governance from becoming the flavor of the month by dedicating a resource and holding a senior manager accountable for IT governance initiatives.
A second position that plays an important role in IT governance is the IT relationship manager.
The IT relationship manager acts as a go-between, communicating the implications of IT
governance to the business units while articulating the needs of the business units back to IT.
He is most successful when he can translate the benefits of IT governance into business terms
and demonstrate that while at times it may be inconvenient, governance delivers value to the
enterprise.


Committees. The bulk of IT governance work is carried out by committees and for many organizations, multiple committees work at different levels to carry out IT governance processes. As mentioned earlier, sometimes these committees are already in existence and add IT governance responsibilities to their list of activities, while other times new committees are formed specifically to address IT governance issues. These committees include executive or senior management, IT investment, IT architecture and standards, and IT/business councils. The actual committees you use depend on organizational structures, culture, and other issues and not all organizations will employ all of these committees at the same time.
IT governance is a collaborative process, so IT governance committees should be as inclusive as possible. There must be a healthy mix of business unit membership, corporate membership, and IT membership.

Governance Processes:

The governance structures above are tasked with enforcing the governance processes articulated below. They include IT portfolio management, service-level agreements, chargeback mechanisms, and IT demand management.


IT portfolio management. IT portfolio management is comprised of a number of subdisciplines, including IT asset management, application portfolio management, and project portfolio management. By rolling up all of these components, a complete and comprehensive view of the entire IT portfolio emerges, enabling better strategic decision-making.

The IT portfolio is proactive management of the collection of projects, applications, systems, etc., and they are evaluated as a group against criteria like balance, flexibility, risk, and their ability to drive value for making future investment decisions.
Service-level agreements. Service-level agreements (SLAs) list available services, alternative quality levels, and related costs provided by IT. SLAs are governance processes because they articulate what service(s) IT is providing to the user, at what service level, and at what cost. Users can negotiate with IT and trade service levels for cost. Once IT exposes service levels and costs in this way it often opens the door to competition from outside service providers (outsourcers), which typically results in market conditions and more efficient IT services. At the same time, SLAs often result in improved behavior from the business units. By exposing costs, the business units have a much better understanding of the implications of their requests for IT services. Ultimately, SLAs should help both IT and business units make better decisions about IT services.
Chargeback mechanisms. Chargeback mechanisms can work in tandem with SLAs or bythemselves. The objective is to chargeback the costs of shared services to the business units that consume them. By IT having a better understanding of its costs, it can demonstrate the savings and efficiencies that result from shared services. At the same time, the business units can better rationalize their behavior with respect to their requirements for IT. With full cost transparency, better decisions can be made by both IT and business units with respect to the acquisition and deployment of IT assets.
Demand management. Demands for IT resources come from all directions and in all forms. Some demand is routine, such as help desk requests and new employee provisioning, while other demand is strategic and complex, such as requests for new applications to support new business opportunities. Demand management forces all IT demand through a single point, where it can be consolidated, prioritized, and fulfilled. Demand management works hand in hand with IT portfolio management to manage current and future IT investments.
Governance Communications:

For IT governance to be effective, it has to be measured and communicated throughout the
enterprise. Communicating about IT governance takes on a number of objectives. At the beginning, all employees need to be educated about what IT governance actually does, its importance, and howit's implemented across the enterprise. This communication needs to be continually reinforced.

Measurement is equally important, and a key piece of the communications strategy. The primary objective of IT governance is to optimize the investment in information technology through strong IT/business alignment, ensuring that these investments return value to the enterprise within an acceptable risk envelope.
· IT Balanced Scorecard. Once an IT governance model is developed for an organization, it
needs to be implemented and then measured. The IT Balanced Scorecard has proven to be an
effective tool with respect to IT governance, and consists of four perspectives: IT Value, User,
Operational Excellence, and Future Orientation. Two of the Scorecard perspectives contain
measures for the two key governance objectives: IT value and risk management. The IT value
perspective contains specific measures for IT/business alignment and IT value, while the
operational excellence perspective contains specific measures for managing IT risk.
· IT portal. Portals have become the premier method of choice for communicating company
information. The IT organization should create an IT governance Web site. This site can then be
used to communicate information about IT governance. It can also contain performance reports
and information about project status, as well as serving as a repository for governance-related
documents including architecture and standards documents, business case templates, and ROI
models.

Businesses rely on their IT departments and resources for competitive advantages and business to business transactions and cannot afford to apply to IT anything less than the same level of commitment they devote company assets. IT offers extraordinary opportunities to transform the business; however IT must deliver value and enable the business, and IT-related risks must be mitigated. Governance of IT, Information Security, and Risk Management encompasses several initiatives for executive management. At a glance, they must be aware of the role and impact of IT on the enterprise, define constraints within which IT professionals should operate and measure performance, understand risk and obtain assurance.

Corporate Governance:

Before discussing Information Technology and Security Governance, one must look at that broader issue of Corporate Governance in the enterprise. Corporate Governance is defined as a structure for determining organizational objectives and monitoring performance to ensure that business objectives are attained. Corporate Governance became a dominant business topic in the wake of many corporate scandals - Enron, WorldCom and Tyco, and is becoming increasing popular today in the wake of TJX credit card breach case. Companies generating interest in corporate governance is not new, but the severity of the financial impacts of the many scandals undermined the confidence of the investment community and corporate stakeholders.

Good corporate governance is important to investors and shareholders. As a matter of fact, many investors, before making an investment decision, validates and ranks the company's corporate governance on par with its financial indicators. As a matter of fact, some investment firms are prepared to pay large premiums for investments in companies with high governance standards.

Whilst there is no single model of good corporate governance, it is noted that in many countries corporate governance is vested in a supervisory board that is responsible for protecting the rights of the shareholders and stakeholders. The board, in turn, works with a senior management team to implement governance principles that ensure the effectiveness of organizational processes.

IT Governance Role:

IT governance is the responsibility of the board of directors and executive management. It is an integral part of corporate governance and consists of the leadership and organizational structures and processes that ensure that the organization's Information Technology sustains and extends the organization's strategies and objectives. Also, IT governance is the term used to describe how those persons responsible for governance of an entity will consider IT in their supervision, monitoring, control and direction of the entity. How IT is applied within the business will have an immense impact on whether the business will attain its vision, mission or strategic goals. In today's economy, and with most businesses reliance on IT for competitive advantage, businesses simply cannot afford to apply to their Information Technology anything less than the level of commitment they apply to overall governance.

Who is Responsible for IT Governance and Risk Management:

Board of Directors (BODs) and executive management have a joint responsibility to protect shareholder value. This responsibility applies just as stringently to valued information assets as it does to any other asset. BODs and management must recognize that securing information and information assets is not just an investment; it is essential for survival in all cases and for many it guarantees competitive advantage. Additionally BODs and management must accept the responsibility of ensuring that:


IT Governance is aligned with the overall Corporate Governance structure within the enterprise.
IT Governance includes an alignment with the Enterprise Risk Management Program, which is a responsibility of the BODs and Management
There is a balance of the operational and economic costs of protective measures and achieve gains in mission capability by protecting the IT systems and data that support their enterprise's business strategy and objectives.
Risks and threats are identified, categorized and mitigated to acceptable levels.
IT Governance obtains coordinated and integrated action from the top down.
IT investments are not mismanaged or misdirected.
IT Governance rules and priorities are established and enforced.
Trust is demonstrated toward trading partners while exchanging electronic transactions.

In Closing:

IT governance covers a number of activities for the board and for executive management, such as becoming informed of the role and impact of IT on the enterprise, assigning responsibilities, defining constraints within which to operate, measuring performance, managing risk and obtaining assurance.
IT Governance is focuses two categories: (1) IT's delivery of value to the business and (2) mitigation of IT risks. In order to have an effective IT and Security Governance strategy businesses must address the following questions:


What decisions must be made to ensure effective management and use of IT?
Who should make these decisions?
How will these decisions be made and monitored?

Always remember that managing information security risks as part of operational risk involves establishing an effective IT governance and control architecture.


Thank you

James Sayles
MBA, BS, CISSP, CISA, CISM
Vice President, Chief Risk and Compliance Officer
Favored Solutions

itgrcthumbThe IT GRC Forum provides educational resources to GRC professionals and welcomes partnership programmes with industry experts. If you are interested in becoming a media partner please contact: This email address is being protected from spambots. You need JavaScript enabled to view it.

.

Osterman ResearchOsterman Research help vendors, IT departments and other organizations make better decisions through the acquisition and application of relevant, accurate and timely data on markets, market trends, products and technologies. We also help vendors of technology-oriented products and services to understand the needs of their current and prospective customers.

Osterman Research provides timely and accurate international market research, cost data, cost models, benchmarking information and other services to technology-based companies. We do this by continually gathering information from IT decision-makers and end-users of information technology. We analyze and report this information to help companies develop and improve the products and services they offer to these markets or to internal customers.

Osterman Research has developed numerous cost models that compare and contrast the cost of various messaging solutions, including hosted/managed versus on-premise solutions.

Among the things that make Osterman Research unique is our market research panel: a large and growing group of IT professionals and end-users around the world with whom we conduct our research surveys. This allows us to conduct surveys quickly and accurately with very high response rates. We are continually developing our panel of IT professionals and end-users into one of the leading sources of information for companies that offer products and services in the IT space.

More information is available at www.ostermanresearch.com

www.contoural.comContoural is a leading independent provider of business and technology consulting services focused on litigation readiness, compliance, information and records management, and data storage strategy. Contoural helps clients address the emerging business requirements around data. For example, electronic discovery rules - under the new Federal Rules of Civil Procedure - now require US companies entering litigation to know what electronically stored information they have, where it is stored, and how quickly they can retrieve it. Similarly, legal and regulatory compliance requirements - under emerging privacy laws - are motivating enterprises to take a closer look at the integrity and security of electronic document files and other digital data.www.contoural.com

www.corp-integrity.comCorporate Integrity, LLC is a strategy & research advisory firm providing education, research, and analysis on enterprise governance, risk management, and compliance. Through ongoing research, interactions and analytics Corporate Integrity is the authority in understanding how organizations can foster a culture that "walks the talk" - where integrity is central to governance, risk and compliance (GRC) practices. Corporate Integrity educates organizations and GRC professionals within those organizations on achieving sustainability, consistency, efficiency, and transparency in their corporate GRC practices to maintain a position of integrity aligned with corporate values and business performance. www.corp-integrity.com

misFounded in 1978, MIS Training Institute is the international leader in audit and information security training, with offices in the USA, UK, and Asia. MIS' expertise draws on experience gained in training more than 200,000 delegates across five continents.
Helping audit and infosecurity professionals stay at the top of their game has always been at the core of MIS' mission. To that end, MIS has developed and focused its seminars, conferences, and symposia on the wide-ranging needs of internal and IT auditors and information security practitioners who are charged with controlling complex systems and business environments. MIS' unparalleled course curriculum covers the most up-to-the-minute topics, provides proven audit and security practices, and delivers the information needed to be successful in today's organizations.

All MIS programs are led by industry experts...hands-on pros who have been in the field and who practice what they teach. Attendees of MIS Training Institute events benefit from unbiased practices, proven strategies, and lessons learned in the real-world.

In addition, MIS offers Web-based training at www.misti-online.comas well as a variety of products and services including in-house training and publications. MIS Training Institute is a Euromoney Training Group company.

MIS Training Institute is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be addressed to the National Registry of CPE Sponsors, 150 Fourth Avenue North, Suite 700, Nashville, TN, 37219-2417, Web site: http://www.nasba.org


www.kuppingercole.comKuppinger Cole + Partner (KCP), founded in 2004, has become the leading Europe-based analyst company for all topics around Identity Management and Digital Identities. KCP stands for expertise, thought leadership, and a vendor-neutral view on the broader "identity market", including aspects like classical Identity and Access Management (IaM), Information Rights Management (IRM), Identity Risk Management, Digital Certificates, Cards and Tokens, Single Sign-On, Auditing, Federation, User Centric Identity Management and Identity 2.0, and many more. www.kuppingercole.com

www.aberdeen.comAberdeenGroup is the leading provider of fact-based research focused on the global technology-driven value chain. Founded in 1988, Aberdeen has established the market leading position as the "voice that matters" when it comes to understanding the measurable results being delivered by technology in business.
www.aberdeen.com

www.brightfly.comFOCUS, FOCUS, FOCUS
All day, every day we focus on security, compliance, and risk management: what's required, what works, and what doesn't. The result is on-target, in-depth advice on the most critical issues you face. Brightfly analysis is constantly tuned by our robust and growing community of IT and business professionals. We are dedicated to advancing the state of the art in security and compliance management through our unique open-source research model.

EXPERIENCED GUIDANCE

We're not just talking heads, but practicing IT, business, and security professionals with years of hands-on experience in business organizations. Every Brightfly researcher has walked many miles in your shoes: we know the threats that haunt you, the fears that plague your management, and where the bodies of dead technologies are buried. Insider, practice-based knowledge hones our analysis and advice-and should be shaping your strategy.

TRANSPARENT, VETTED RESEARCH

All Brightfly research is subject to the scrutiny and comments of the practicing community. In terms of successful controls and programs, we know it takes a village to raise a child; our mission is to ensure that the child doesn't grow up to be the village idiot. Backed by this open, community-driven model, our commitment to honest, transparent analysis reaches far beyond the agendas of individual vendors and into the heart of the market. www.brightfly.com


scceSCCE is a non-profit membership organization serving more than 1300 corporate compliance and ethics officers globally. We champion ethical practice and compliance standards and are dedicated to improving the quality of corporate governance, compliance and ethics. Visit www.corporatecompliance.orgto learn more about how we can help you improve your program, deepen your knowledge base and become a Certified Compliance and Ethics Professional.

www.ergogroup.co.ukErgo is a Business Change and Programme Management Consultancy that provides consultancy services to whole of business programmes. Ergo has over 15 years experience working with a blue chip client base managing complex business change programmes with budgets of up to £50M.
The ability to manage change is now viewed by many organisations as a core competence. Large organisations manage many strategic programmes, projects and tactical initiatives in parallel. As a result it can prove difficult to maintain visibility of which changes are landing where or when, and potential conflicts go unnoticed until it is too late. Ergo developed the Enterprise PACE programme in order to provide Executives with visibility of the impact of change on their customers, departments and processes. It has been described by our customers as "providing air traffic control for business change". The Enterprise PACE application and methodology is used to integrate all the implementation activities from both project plans and tactical initiatives in order to develop change runways for key customers, departments, processes or systems.
http://www.ergogroup.co.uk

www.brighttalk.comBrightTALK stands for knowledge.
At BrightTALK, we believe that knowledge should be transmitted directly from the people who know it best. And the ability to question and interact with experts and knowledge providers enriches the experience for all.

Since BrightTALK was founded in 2002, we have devoted ourselves to making webcasting the ultimate business tool for transferring knowledge. You can join BrightTALK's vibrant exchange of ideas as either a presenter or a viewer.

We offer viewers live, interactive access to the world's top thought leaders. You identify the topics most relevant to you and are introduced to new experts. Additionally, your comments, your ideas, and your voice can influence how others think. www.brighttalk.com

www.madisonlogic.comMadison Logic is the only ad serving company built specifically for online lead generation to respond to the evolution of performance marketing. Now especially, lead generation is becoming a more popular and widely used ad vehicle because of its accountability and cost effectiveness.

Our LeadFocusTM technology provides a comprehensive yield and inventory management solution for publishers to monetize their content, end users an additional resource to make purchasing decisions and for marketers, a means to generate valuable sales leads. We aim to bridge the gap between lead sources, back end systems and external lead buyers.

We currently have partnerships with over 50 premium media partners, including IDG's PCWorld, Ziff Davis' PC Magazine, Penton Media's Marketing Group, Haymarket media, Clickz, Imediaconnection, DMNews, Adotas, amongst others.

The IT GRC Forum has partnered with IT Analysts and GRC Experts to provide members with leading market intelligence on IT GRC trends and solutions. To access FOC and paid research reports you have to be a member of the IT GRC Forum. If you are not yet a member you should register here, registration is free of charge.

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

CyberBanner

Log in Register

Please Login to download this file

Username *
Password *
Remember Me

Banner

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top