david cieslak<\/a>, cpa, citp, gsec, chairman of the aicpa\u00e2\u20ac\u2122s information technology executive committee. more than 1,500 participants ranked the 30 technology initiatives they felt will have the most significant impact in the next 12 to 18 months.<\/p>\n\u00e2\u20ac\u0153organizations continue to make large-scale it-related investments and, while the rewards can be significant, the potential for financial loss or harm to reputation due to a security problem is a growing concern,\u00e2\u20ac\u009d said everett c. johnson, cpa, international president of isaca. \u00e2\u20ac\u0153businesses are realizing that control and value are achieved by focusing on what it enables the business to achieve, rather than on the technology itself. as the survey indicates, there is a clear need for management, auditors, and it professionals to ensure that the appropriate security and governance processes are in place.\u00e2\u20ac\u009d<\/p>\n
each year the members of the ita look forward to working with the aicpa and isaca to compile this very important list,\u00e2\u20ac\u009d said ron eagle, ita president. \u00e2\u20ac\u0153with the different facets and the rapid pace of change in it today, it is critical to identify what others see as the key issues that may impact you, your clients and employer. the top technology initiative survey meets that need perfectly.\u00e2\u20ac\u009d<\/p>\n
the 10 most important technology initiatives for 2007, along with their definitions, are as follows: <\/b><\/p>\n
1. information security management:<\/b> a systematic approach to encompassing people, processes and it systems that safeguards critical systems and information, protecting them from internal and external threats. incorporates the preservation of confidentiality (information is not available or disclosed to unauthorized individuals, entities, or processes), integrity (safeguarding the accuracy and completeness of key data) and availability (systems and data are accessible and usable upon demand by an authorized entity) of information. other properties such as authenticity, accountability, non-repudiation and reliability may also be involved.<\/p>\n
2. identity and access management:<\/b> identity and access management consists of the hardware, software and processes used to authenticate a user\u00e2\u20ac\u2122s identity, i.e. ensure users are who they say they are; then provide users with appropriate access to systems and data based pre-established rights and privileges. identity management may utilize one, two or three factor authentication and include passwords, tokens, digital certificates (for web sites and e-mail systems), public key infrastructure (pki), biometrics and other emerging technologies.<\/p>\n
3. conforming to assurance and compliance standards:<\/b> creating formalized strategies and systems to address organizational goals and statutory requirements. these strategies and systems may include collaboration and compliance tools to monitor, document, assess, test and report on compliance with specified controls. it encompasses risk assessment standards, risk management and continuous auditing\/continuous monitoring.<\/p>\n
4. privacy management:<\/b> the rights and obligations of individuals and organizations with respect to the collection, use, disclosure and retention of personal information. as more information and processes are converted to a digital format, this information must be protected from unauthorized users and from unauthorized usage by those with access to the data, including complying with local, state, national and international laws, and the convergence of security and privacy.<\/p>\n
5. disaster recovery planning (drp) and business continuity management (bcm):<\/b> a holistic management process that identifies potential threats to an organization and the impact those threats may have on business operations. resources can include it equipment, data records, the physical space of an organization, and personnel. threats to these resources may include theft, virus infestation, weather damage, accidents or other malicious destruction. a well defined, documented, and communicated plan can help provide structure and stability in the event of a business interruption or catastrophe greatly improving the chance of business survival.<\/p>\n
6. it governance:<\/b> a structure of relationships and processes that direct and control an organization and help it achieve its goals by adding value while balancing risk versus return over it and its processes. includes it roi, or the decisions around technology investments and how to optimize related returns.<\/p>\n
7. securing and controlling information distribution (new)<\/i>: <\/b>protecting and controlling the distribution of digital data, i.e. enabling secure distribution and\/or preventing illegal distribution and access to protected information. example: a document distribution strategy controlled by a digital rights management (drm) server that prevents an encrypted document from being opened by anyone other than the intended recipient.<\/p>\n
8. mobile and remote computing (new)<\/i>:<\/b> technologies that enable users to securely connect to key resources anywhere, anytime regardless of physical location. enabling technologies include tablet pcs; pdas; and wireless technologies such as bluetooth, wifi and wimax.<\/p>\n
9. electronic archiving and data retention (new)<\/i>:<\/b> technologies that enable appropriate archiving and retrieval of key information over a given (statutory) period of time with improved efficiency and access to the information. this includes policies and processes to ensure destruction of information from storage and archival media in a timely and consistent manner. information includes traditional data as well as telephony, im traffic, and other emerging forms of collaboration. storage and backup technologies, including direct attached storage (das), network attached storage (nas) and storage area networks (sans), and optical devices such as dvds, cds, and blu-ray help support the archiving and retrieval process.<\/p>\n
10. document, content and knowledge management (new)<\/i>:<\/b> the process of capturing, indexing, storing, retrieving, searching and managing information electronically, including database management of pdfs and other formats. knowledge management then brings structure and control to this information, allowing organizations to harness the intellectual capital contained in the underlying data. this is sometimes referred to as the \u00e2\u20ac\u0153paperless\u00e2\u20ac\u009d office even though \u00e2\u20ac\u0153less-paper\u00e2\u20ac\u009d or digital office may be a more accurate term.<\/p>\n like this on facebook<\/span><\/a><\/li> share on linkedin<\/span><\/a><\/li> tweet this item<\/span><\/a><\/li> email this<\/span><\/a><\/li><\/ul><\/div> <\/div>","protected":false},"excerpt":{"rendered":"
for the fifth consecutive year, information security is the technology initiative expected to have the greatest effect in the upcoming year. by rick telberg a related initiative, identity and access management, jumped from sixth place in 2006 to second in … continued<\/a><\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[2306],"tags":[],"class_list":["post-603","post","type-post","status-publish","format-standard","hentry","category-tech-and-fintech"],"acf":[],"yoast_head":"\naicpa top tech issue: security (for 5th year in a row) - 卡塔尔世界杯常规比赛时间<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n \n \n \n \n \n\t \n\t \n\t \n