IT risk : turning business threats into competitive advantage / George Westerman, Richard Hunter.

By: Westerman, George, 1963-Contributor(s): Hunter, Richard, 1952-Material type: TextTextSeries: Gartner, Inc./Harvard Business School Press seriesPublisher: Boston, Mass. : Harvard Business School Press, c2007Description: xiv, 221 p. : ill. ; 25 cmISBN: 9781422106662 (hardcover : alk. paper); 1422106667Subject(s): Information technology -- Management | Management information systems | Risk management | Information technology -- Security measuresDDC classification: 658.4/038 LOC classification: HD30.2 | .W464 2007Online resources: Table of contents only Review: "In this book, the authors define four types of IT risk: availability, access, accuracy, and agility. Citing numerous company examples, they then introduce three disciplines that enterprises must master to manage IT risk effectively: a solid foundation of IT assets, people, and supporting processes and controls that enable executives to manage the right risks in the right order; a well-designed risk governance process - including oversight by high-level executives - that allows companies to identify, prioritize, and track risks; and a risk-aware culture, nurtured from the top, that attunes people to the causes and solutions for IT risks and creates increased vigilance across the organization."--BOOK JACKET.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)

Includes bibliographical references and index.

"In this book, the authors define four types of IT risk: availability, access, accuracy, and agility. Citing numerous company examples, they then introduce three disciplines that enterprises must master to manage IT risk effectively: a solid foundation of IT assets, people, and supporting processes and controls that enable executives to manage the right risks in the right order; a well-designed risk governance process - including oversight by high-level executives - that allows companies to identify, prioritize, and track risks; and a risk-aware culture, nurtured from the top, that attunes people to the causes and solutions for IT risks and creates increased vigilance across the organization."--BOOK JACKET.

1 2

There are no comments on this title.

to post a comment.