|
IDG Network: |
||
|
|
||||||||
|
|
||||||||||||||||
|
The Link Between Information Security and Corporate Governance
Opinion by Orson Swindle and Bill Conner MAY 05, 2004 Information security, though often viewed as a set of technical issues, must be embraced as a corporate governance responsibility that involves risk management, reporting controls, testing and training, and executive accountability. As such, it requires the active engagement of all CEOs and boards of directors. To this end, the Corporate Governance Task Force for the National Cyber Security Partnership was established last December to develop and promote a coherent management framework and to drive implementation of effective information security programs across all industries, organizations and educational institutions. Earlier this month, the task force unveiled its initial report, "Information Security Governance: A Call to Action," which was crafted through an unprecedented level of consensus and resource sharing among member experts from academia, government and industry. Corporate governance consists of the set of policies and internal controls by which organizations, irrespective of size or form, are directed and managed. The task force report provides a subset of governance policies and controls that include identifying cybersecurity roles and responsibilities within executive management structures, establishing risk management and quality assurance benchmarks, creating institutionalized testing and training, and outlining best practices and industry metrics. In addition, flexible assessment tools were developed to bring accountability to three key elements of corporate governance: people, process and technology. By using the information security governance framework, CEOs and boards of directors will create a safer business community internally and for their customers and others interconnected throughout the critical infrastructure. In aggregate, such measures serve as an executive call to action that will also help better protect our nation's security.
continued>> |
|||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||
|
|
|||||||||||||||||||||||
|
Sponsored Links The teleworker explosion is here. Avaya has solutions. Serving Your Customers An Outstanding Online Experience Download this free white paper now! Sprint - Connects the PGA to the World. Free Verisign SSL Certificate Don't miss the opportunity! Obtain a FREE SSL Trial ID today. Free Email Compliance Reference Guide. For help with Email Compliance this book rules! Email Security Services MS IT Secrets Watch a live webcast. Ask field experts questions. Sign up |
|||||||||||||||||||||||
|
Copyright © 2005 Computerworld Inc. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of Computerworld Inc. is prohibited. Computerworld and Computerworld.com and the respective logos are trademarks of International Data Group Inc. |
|||||||||||||||||||||||