iso2700x.blogspot.com
ISO 27001,BS 7799 Certification: October 2008
http://iso2700x.blogspot.com/2008_10_01_archive.html
ISO 27001,BS 7799 Certification. Tuesday, October 28, 2008. ISO17799 Newsletter - Issue 3. ISO17799 Newsletter - Issue 3. Welcome to the third edition of the ISO17799 newsletter, designed to keep you abreast of news and developments with respect to 17799 and information security. T. He information contained in this newsletter is absolutely free to our subscribers and provides guidance on various practical issues, plus commentary on recent Information Security incidents. Section 4: New Product Review.
itil-service-management-shop.com
ITIL BS15000
http://www.itil-service-management-shop.com/bs15000.htm
BS15000 is the first standard for service management. It comprises two parts, 1 and 2. Part 1 comprises ten sections: Scope, Terms and Definitions, Requirements for a Management System, Planning and Inplementing Service Management, Planning and Implementing New or Changed Services, Service Delivery Process, Relationship Processes, Resolution Processes, Control Processes, and Release Process. These sections define the requirements for an organization to deliver managed services,. Return To Main Page.
itil-service-management-shop.com
ITIL Service Support
http://www.itil-service-management-shop.com/service-support.htm
Service Support comprises those disciplines that enable IT Services to be provided. The 5 recognised disciplines are:. This is the implementation of a database (Configuration Management Database - CMDB) that contains details of the organization s elements that are used in the provision and management of its IT services. This is more than just an asset register , as it will contain information that relates to the maintenance, movement, and problems experienced with the Configuration Items.
itil-service-management-shop.com
ITIL - Information Security Policies
http://www.itil-service-management-shop.com/security-policies.htm
ITIL - Information Security Policies. Information security policies are the foundation, the bottom line, of information security within an organization. Whereas risk analysis strives to ensure that security matches need, policies define the baseline - the minimum acceptable security level. The following sites contain information and resources for the creation of comprehensive information security policies:. Information Security Policies and Standards. RUsecure Information Security Policies.
itil-service-management-shop.com
ITIL and Security Management
http://www.itil-service-management-shop.com/security.htm
ITIL and Security Management. The roles of risk and security are key elements within responsible service management. They interlink across the whole of the service management discipline. How do you ensure therefore that security is appropriate for your needs? How do you apply a security baseline throughout your operation? Essentially, how do your ensure that your services are secure? More information on COBRA, including a downloadable evaluation copy, can be found here. With such a fundamental role withi...
itil-service-management-shop.com
ITIL Best Practice
http://www.itil-service-management-shop.com/itil.htm
ITIL addresses six topics: Service Support; Service Delivery; Planning to Implement Service Management; ICT Infrastructure Management; Applications Management; The Business Perspective. Overall, it is essentially a representation of best practice for IT service management, comprising a series of books and information which provide guidance on the quality provision of IT services. IT Service Management (ITSM) itself is generally divided into two main areas, Service Support.
security-audit-internal-audit.com
The Security Audit Shop - Data Protection Act
http://www.security-audit-internal-audit.com/legislation.htm
AUDITING AGAINST THE DATA PROTECTION ACT. The DPA Toolkit comprises checklists, policies and questionnaires, as well as a guide and a task list, to help you manage Data Protection legislation. Is a useful collection of documents to assist in understanding, and meeting the requirements of the Data Protection Act. Each item included is tried and trusted in a substantial number of organizations. Essentially what you need to do. To help you to fully comply. To help you audit against the DPA requirements.
businesscontinuityworld.com
The Disaster Recovery Toolkit: Information Security Policies
http://www.businesscontinuityworld.com/security-policies.htm
The Disaster Recovery Toolkit: Information Security Policies. Business Continuity Toolkit: Information Security Policies. It is important that the business continuity and disaster recovery initiatives are integral to the culture of the organization. Ensuring the long term future of the organization should be part and parcel of the operational framework. Ensuring continuity should be everyones responsibility. The policies themselves are described on the following two web sites:. Return to main page.
itil-service-management-shop.com
ITIL Service Delivery
http://www.itil-service-management-shop.com/service-delivery.htm
Service Delivery is the management of the IT services themselves. The 5 recognised disciplines are:. Service Level Management is the primary management of IT services, ensuring that agreed services are delivered when and where they are supposed to be delivered. Capacity Management is the discipline that ensures IT infrastructure is provided at the right time in the right volume at the right price, and ensuring that IT is used in the most efficient manner. Page for more information.
itil-service-management-shop.com
ITIL - Contingency Planning
http://www.itil-service-management-shop.com/contingency.htm
ITIL - Contingency Planning. Contingency planning is the process of ensuring that IT Services can continue should a serious incident occur. Clearly, this is a fundamental part of service management. The contingency planning process involves a number of steps. These range from business impact analysis (assessing what the potential impact of an incident may be) to creation and testing of a sound plan. CREATING A CONTINGENCY PLAN. Buy It Here: $199. AUDITING THE PLAN and CONTINGENCY PRACTISES. BS15000 can n...