by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : May 30, 2014
Furthermore, "management plans, builds, runs and monitors activities in alignment with the direction set by the governance body to achieve the enter- prise objectives." As technology use continues to increase the spread and impact of IT and cyber vulnerabilities and inci- dents, so do the tools and techniques to improve controls to protect key enter- prise resources. The COBIT 5 frame- work is one of those tools. (COBIT 5 currently consists of the framework, two enabler guides, four professional guides, and COBIT 5 Online Collabora- tive Environment.) Moreover, COBIT 5 is one of the informative references contained in the National Institute of Standards and Technology s Cyberse- curity Framework. COBIT 5 is built on ve basic prin- ciples and includes extensive guidance on enablers for governance and man- agement of enterprise IT. Enterprises can use COBIT 5 framework principles to create optimal value by governing IT in a holistic manner, implement- ing comprehensive risk management and security controls, and ensuring that those controls are de ned and implemented at a level appropriate to the increasing complexity of the enterprise. The COBIT 5 framework delivers to its stakeholders the most complete and up-to-date guidance on governance and management of enterprise IT. COBIT has proved to be very effec- tive for implementing IT governance and detailed security controls globally at all sorts of institutions and a num- ber of federal and state government agencies, including the Department of Veterans Affairs. Sound IT governance can make a signi cant difference. In light of the constant changes in the IT environ- ment, all enterprises should look to IT governance to secure information from the moment it is created to the time it is destroyed. That is why, in the past decade, IT governance has moved to the forefront of enterprise efforts to effectively manage and appropriately protect IT systems and assets, contributing to the success of risk-based security and supporting strategic decisions made by C-level executives across the public and pri- vate sectors. ■ Dan Chenok is executive director of the IBM Center for the Business of Government, and John Lain- hart leads IBM's Public Sector Cybersecurity and Privacy Services. May 30, 2014 FCW.COM 27 NETWORKING and STORAGE EFFICIENCY Best P actices ONLINE REPORT SPONSORED BY: Research Report Agencies invest in infrastructure upgrades Network complexity poses performance challenge Virtualization looms large in network planning Storage managers face big jump in data storage Storage planning to mix new and old solutions Agencies invest in infrastru Topics Include to learn more, visit: FCW.com/NetworkingandStorage
May 15, 2014
June 30, 2014