SlideShare a Scribd company logo
Establishing a Framework for
Security and Control
 Information Systems Controls
 Risk Assessment
 Security Policy
 Disaster Recovery Planning and
Business Continuity Planning
 The Role of Auditing

Copyright © Albrecht & Jones 2013

More Related Content

What's hot

Enterprise resource planning (erp) systems
Enterprise resource planning (erp) systemsEnterprise resource planning (erp) systems
Enterprise resource planning (erp) systems
Rao Majid Shamshad
 
ERP Benefits and Limitations
ERP Benefits and LimitationsERP Benefits and Limitations
ERP Benefits and Limitations
ERPSirius UK
 
Information systems development methodologies
Information systems development methodologiesInformation systems development methodologies
Information systems development methodologies
Fereshte Moghadam
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for Management
Kanishka Gopal
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
Dejan Kosutic
 
ISO 27001
ISO 27001ISO 27001
Accenture Regulatory Reporting As A Service
Accenture Regulatory Reporting As A ServiceAccenture Regulatory Reporting As A Service
Accenture Regulatory Reporting As A Service
accenture
 
Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]
mmuser2014
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
The Open Group SA
 
Erp ppt
Erp pptErp ppt
CISA Review Course Slides - Part1
CISA Review Course Slides - Part1CISA Review Course Slides - Part1
CISA Review Course Slides - Part1
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
 
ESA for Business
ESA for BusinessESA for Business
ESA for Business
Maganathin Veeraragaloo
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planning
AakashTiwari43
 
ERP vs SAP (Difference)
ERP vs SAP (Difference)ERP vs SAP (Difference)
Itil Mind Maps
Itil Mind MapsItil Mind Maps
Itil Mind Maps
Lyju Thomas
 
Cloud computing risk assesment
Cloud computing risk assesment Cloud computing risk assesment
Cloud computing risk assesment
Ahmad El Tawil
 
Benefits of ERP
Benefits of ERPBenefits of ERP
Benefits of ERP
thomasmary607
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
Bob Rhubart
 
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT Perspective
Sayyed Zakir Ali Rizwe
 
Enterprise resource planning_system
Enterprise resource planning_systemEnterprise resource planning_system
Enterprise resource planning_system
Jithin Zcs
 

What's hot (20)

Enterprise resource planning (erp) systems
Enterprise resource planning (erp) systemsEnterprise resource planning (erp) systems
Enterprise resource planning (erp) systems
 
ERP Benefits and Limitations
ERP Benefits and LimitationsERP Benefits and Limitations
ERP Benefits and Limitations
 
Information systems development methodologies
Information systems development methodologiesInformation systems development methodologies
Information systems development methodologies
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for Management
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Accenture Regulatory Reporting As A Service
Accenture Regulatory Reporting As A ServiceAccenture Regulatory Reporting As A Service
Accenture Regulatory Reporting As A Service
 
Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Erp ppt
Erp pptErp ppt
Erp ppt
 
CISA Review Course Slides - Part1
CISA Review Course Slides - Part1CISA Review Course Slides - Part1
CISA Review Course Slides - Part1
 
ESA for Business
ESA for BusinessESA for Business
ESA for Business
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planning
 
ERP vs SAP (Difference)
ERP vs SAP (Difference)ERP vs SAP (Difference)
ERP vs SAP (Difference)
 
Itil Mind Maps
Itil Mind MapsItil Mind Maps
Itil Mind Maps
 
Cloud computing risk assesment
Cloud computing risk assesment Cloud computing risk assesment
Cloud computing risk assesment
 
Benefits of ERP
Benefits of ERPBenefits of ERP
Benefits of ERP
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT Perspective
 
Enterprise resource planning_system
Enterprise resource planning_systemEnterprise resource planning_system
Enterprise resource planning_system
 

More from Albrecht Jones

Building an E-Commerce Presence
Building an E-Commerce PresenceBuilding an E-Commerce Presence
Building an E-Commerce Presence
Albrecht Jones
 
E-Commerce: Business and Technology
E-Commerce: Business and TechnologyE-Commerce: Business and Technology
E-Commerce: Business and Technology
Albrecht Jones
 
E- Commerce and the Internet
E- Commerce and the InternetE- Commerce and the Internet
E- Commerce and the Internet
Albrecht Jones
 
E-Commerce Systems
E-Commerce SystemsE-Commerce Systems
E-Commerce Systems
Albrecht Jones
 
Enterprise Applications: New Opportunities and Challenges
Enterprise Applications: New Opportunities and ChallengesEnterprise Applications: New Opportunities and Challenges
Enterprise Applications: New Opportunities and Challenges
Albrecht Jones
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise Systems
Albrecht Jones
 
Enterprise Wide Systems
Enterprise Wide SystemsEnterprise Wide Systems
Enterprise Wide Systems
Albrecht Jones
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
Albrecht Jones
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
Albrecht Jones
 
An Information Systems Security Primer for Managers
An Information Systems Security Primer for ManagersAn Information Systems Security Primer for Managers
An Information Systems Security Primer for Managers
Albrecht Jones
 
The Wireless Revolution
The Wireless RevolutionThe Wireless Revolution
The Wireless Revolution
Albrecht Jones
 
The Global Internet
The Global InternetThe Global Internet
The Global Internet
Albrecht Jones
 
Communications Networks
Communications NetworksCommunications Networks
Communications Networks
Albrecht Jones
 
A Telecommunications Primer for Managers
A Telecommunications Primer for ManagersA Telecommunications Primer for Managers
A Telecommunications Primer for Managers
Albrecht Jones
 
Managing Data Resources
Managing Data ResourcesManaging Data Resources
Managing Data Resources
Albrecht Jones
 
The Database Approach to Data Management
The Database Approach to Data ManagementThe Database Approach to Data Management
The Database Approach to Data Management
Albrecht Jones
 
Organizing Data in a Traditional File Environment
Organizing Data in a Traditional File EnvironmentOrganizing Data in a Traditional File Environment
Organizing Data in a Traditional File Environment
Albrecht Jones
 
A Data Management Primer for Managers
A Data Management Primer for ManagersA Data Management Primer for Managers
A Data Management Primer for Managers
Albrecht Jones
 
Management Issues
Management IssuesManagement Issues
Management Issues
Albrecht Jones
 
Contemporary Software Platform Trends
Contemporary Software Platform TrendsContemporary Software Platform Trends
Contemporary Software Platform Trends
Albrecht Jones
 

More from Albrecht Jones (20)

Building an E-Commerce Presence
Building an E-Commerce PresenceBuilding an E-Commerce Presence
Building an E-Commerce Presence
 
E-Commerce: Business and Technology
E-Commerce: Business and TechnologyE-Commerce: Business and Technology
E-Commerce: Business and Technology
 
E- Commerce and the Internet
E- Commerce and the InternetE- Commerce and the Internet
E- Commerce and the Internet
 
E-Commerce Systems
E-Commerce SystemsE-Commerce Systems
E-Commerce Systems
 
Enterprise Applications: New Opportunities and Challenges
Enterprise Applications: New Opportunities and ChallengesEnterprise Applications: New Opportunities and Challenges
Enterprise Applications: New Opportunities and Challenges
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise Systems
 
Enterprise Wide Systems
Enterprise Wide SystemsEnterprise Wide Systems
Enterprise Wide Systems
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
 
An Information Systems Security Primer for Managers
An Information Systems Security Primer for ManagersAn Information Systems Security Primer for Managers
An Information Systems Security Primer for Managers
 
The Wireless Revolution
The Wireless RevolutionThe Wireless Revolution
The Wireless Revolution
 
The Global Internet
The Global InternetThe Global Internet
The Global Internet
 
Communications Networks
Communications NetworksCommunications Networks
Communications Networks
 
A Telecommunications Primer for Managers
A Telecommunications Primer for ManagersA Telecommunications Primer for Managers
A Telecommunications Primer for Managers
 
Managing Data Resources
Managing Data ResourcesManaging Data Resources
Managing Data Resources
 
The Database Approach to Data Management
The Database Approach to Data ManagementThe Database Approach to Data Management
The Database Approach to Data Management
 
Organizing Data in a Traditional File Environment
Organizing Data in a Traditional File EnvironmentOrganizing Data in a Traditional File Environment
Organizing Data in a Traditional File Environment
 
A Data Management Primer for Managers
A Data Management Primer for ManagersA Data Management Primer for Managers
A Data Management Primer for Managers
 
Management Issues
Management IssuesManagement Issues
Management Issues
 
Contemporary Software Platform Trends
Contemporary Software Platform TrendsContemporary Software Platform Trends
Contemporary Software Platform Trends
 

Establishing a Framework for Security and Control

  • 1. Establishing a Framework for Security and Control  Information Systems Controls  Risk Assessment  Security Policy  Disaster Recovery Planning and Business Continuity Planning  The Role of Auditing Copyright © Albrecht & Jones 2013