Skip to main content

Home/ Consitio_20121/ Group items tagged risk

Rss Feed Group items tagged

Manuel Carmona

IT risk management - Wikipedia, the free encyclopedia - 0 views

  • Risk management is the process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives, and deciding what countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the information resource to the organization
  • The IT risk management is the application of risk management to Information technology context in order to manage IT risk, i.e.: The business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise
  •  
    "Risk management is the process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives, and deciding what countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the information resource to the organization"
  •  
    Esta página habla de la Gestión del Riesgo en las TIC así como sus marcos de trabajo más aceptados: ISO 27005 y NIST SP 800 30.
Gonzalo Gandía

What CISOs Need to Know about Cloud Computing - 0 views

  • cloud computing isn’t more or less secure than traditional infrastructure – it is different. Some risks are greater, some are new, some are reduced, and some are eliminated
  •  
    A review of how security risks change in cloud computing vs traditional computing
Gonzalo Gandía

Security risk management - 0 views

  •  
    Where companies fail and succeed 
Gonzalo Gandía

IT Security and Risk Management - 0 views

  •  
    An Overview
Gonzalo Gandía

A Scrum Master is NOT a Project Manager | Code Enigma - 0 views

  •  
    "Scrum Masters can come from Project Management but that's not a guaranteed fit. Business Analysts and team members can also fit the role. A lot of traditional Project Managers struggle with the transition because they're stepping away from a very structured position, one with them at the helm steering the development and the team towards a pre-defined specification. The often overwhelming change controls imposed in traditional waterfall approaches are no longer there to protect the Project Manager from the risks associated with change. Gone is the over-analysing, form filling approach to change. The Product Owner now has to deal with change, often on a daily basis. Those changes don't have to be a big shift but the decisions made to include them can have a big effect on the end product. Being able to make those decisions is important to the flow of the project to make sure that it A product definition can change massively from the beginning of a project. In fact, a product doesn't need to be fully defined at the outset of an Agile project. That scares the pants off the traditionalists! This is where the Scrum Master plays a vital role. While Agile is becoming a part of many projects, there are still many who shy away from it, are nervous of it or just don't trust it. Often, they see the traditional Project Manager role as far easier to understand. What they don't realise are the restrictions imposed by the old role and approach. The Scrum Master has to coach the Product Owner to help them understand how to achieve their goals and how to continually adapt and prioritise their backlog. He is the link between the Product Owner and the team. The team, depending on their experience will often look for guidance and help in solving issues and blockers. The Scrum Master needs to steer the development through these issues, to resolve any problems that are blocking the development and to involve those in the project with the skills and experience to resolve. There is often
guillermo cortina

Preface :: Network security assessment :: Networking :: eTutorials.org - 0 views

  • Assessment is the first step any organization should take to start managing information risks correctly
    • guillermo cortina
       
      Evaluar la red para un responsable de seguridad, es el primer paso a tomar para conocer las vulnerabilidades del sistema. Este libro proporciona una guía informativa de las herramientas y técnicas que los enemigos pueden usar.
  •  
    Edicion inglesa del libro en castellano publicado por ANAYA de Chris Mcnab titulado SEGURIDAD DE REDES Técnicas y herramientas para la evaluación de seguridad de redes
1 - 6 of 6
Showing 20 items per page