IT Today, January 2010 Issue





Welcome to the January 2010 Issue of Auerbach's IT Today


In this issue of IT Today:

Stretching the IT Budget: Look Beyond the Obvious

Software Testing Project Execution

Why Are Information Technology Controls and Audit Important?

The Keys to Intergenerational Harmony

Improving Performance in Troubled Times through Distance Learning

12 Dangers of Endpoint Security

The Internet Security Landscape: A Look Back at 2009 and Predictions for 2010

Introduction to Risk Analysis


PLUS New Books and Conferences to Help You to Get Ahead


Stretching the IT Budget: Look Beyond the Obvious

IT departments willing to look beyond the surface and the obvious can often eliminate apparent tradeoffs without having to choose one side or the other. When faced with a situation that appears to force a tradeoff, try to examine the problem from a different angle. Taking this fresh-thinking perspective can stretch the IT budget to achieve goals that you might otherwise forgo in an environment of severe financial constraints.

Read article



Software Testing Project Execution

In an ideal world, project planning would be the main task and project execution would be like pressing a button to start and finish it. Alas, this is not the case. In many industries execution is still the king. This is because despite all the advances in automation and standardization of processes, executing any plan is still difficult. The road to execution is laden with unimaginable pitfalls and unavoidable circumstances that ensure that execution is a challenge and not a walk in the park.

Read article



Why Are Information Technology Controls and Audit Important?

The role of IT control and audit has become a critical mechanism for ensuring the integrity of information systems and the reporting of organizational finances to avoid and hopefully prevent future financial fiascos such as Enron and WorldCom. Global economies are more interdependent than ever and geopolitical risks impact everyone. Electronic infrastructure and commerce are integrated in business processes around the globe. For the IT auditor, the need for audit, security, and control will be critical in the areas of IT and will be the challenge of this millennium. There are many challenges ahead; everyone must work together to design, implement, and safeguard the integration of these technologies in the workplace. The chapter from Information Technology Control and Audit, Third Edition by Frederick Gallegos and Sandra Senft explains why.

Read article



The Keys to Intergenerational Harmony

Most of what's been written about multiple generations working side by side has come from those of us who are considerably older and more experienced than our Gen X and Gen Y counterparts. In this article, Sheryl Lindsell-Roberts and Nancy Settle-Murphy sought the perspectives of some of their Gen X and Gen Y colleagues. After all, for all of the wisdom we older generations think we have to offer, the Gen X and Y folks of the world have a lot to teach us, too.

Read article



Improving Performance in Troubled Times through Distance Learning

This article maps out several important steps to creating a successful multifaceted distance learning program. The starting premise: Simply throwing a slide presentation onto a website, while it may be fast and inexpensive, almost never achieves the intended results. Instead, it is a thoughtfully-created program that encompasses a variety of learning activities that can cultivate skills and accelerate time to practical application.

Read article



Most Popular Articles on IT Today

Storage and the VMware VMFS File System

The Crisis Management Plan

Managing the IT Procurement Process

Introduction to Mobile Computing and Communications

VMWare ESX Performance Optimization

Click here to search the IT Today Archives



12 Dangers of Endpoint Security

2010 promises to be filled with new technologies giving SMBs access to a growing variety of IT tools to improve productivity, such as netbooks, smartphones and cloud computing-based services. But without adequate endpoint security best practices in place, a business leaves itself open to external and internal threats that can cripple it. To enable SMBs to get maximum benefit in 2010 from these technologies, Symantec has developed a list of the "12 Dangers of Endpoint Security" to help SMBs and their solution providers identify and thwart them.

Read article



New Books

Project Management Theory and Practice

formation Security Management: Concepts and Practice

Advances in Network Management

IP Communications and Services for NGN

Official (ISC)2 Guide to the CISSP CBK, Second Edition

Click here to search the online catalog.



The Internet Security Landscape: A Look Back at 2009 and Predictions for 2010

It's been said we should learn from the past, live in the present and plan for the future. Symantec Security Response's top researchers analyzed the data they collected over the past year and compiled a list of the top security trends they saw from 2009. In their quest to stay ahead of the bad guys and anticipate security protection needs for their customers, they also theorize on what they expect to see in 2010. One thing is for certain, Internet security threats are not diminishing or going away. These researchers expect to continue to see an increase in sophistication of security threats and social engineering tactics in an attempt to victimize computer users.

Read article



Introduction to Risk Analysis

Risk management is a process that provides management with the balance of meeting business objectives or missions and the need to protect the assets of the organization cost effectively. In this period of increased external scrutiny due to the myriad questionable management decisions and the corresponding legislative backlash, risk management provides management with the ability to demonstrate actively due diligence and how they are meeting their fiduciary duty. This chapter from How to Complete a Risk Assessment in 5 Days or Less by Tom Peltier examines how risk analysis helps managers meet their due diligence requirements.

Read article



The 2010 SharePoint Technology Conference
February 10 to 12 in San Francisco

The 2010 SharePoint Technology Conference focuses on Microsoft's collaboration software used by IT developers, users and managers. Whether you are migrating to SharePoint 2010, remaining with SharePoint 2007 or just getting started with SharePoint, the future of SharePoint education is at SPTechCon. IT Today subscribers receive a $100 discount off the Full Event Passport* or gain free admission* to the exhibits by inserting the code MEDIASPONSOR when prompted on the eRegistration page.
(*First time registrants only. Cannot be combined with other offers.)

For more information and to register, visit www.stpcon.com.



The Enterprise Software Development Conference
March 1 to 3 in San Mateo, California

The Enterprise Software Development Conference is for IT professionals who design, code, build, deploy and manage software for their business. These include software project managers, architects, programmers, and others involved in the enterprise software development lifecycle. If you attend only one software development conference in 2010, it should be the Enterprise Software Development Conference.
ITKnowledgebase subscribers can receive a $100 discount off the Full Event Passport* or gain free admission* to the exhibits by inserting the code MEDIASPONSOR when prompted on the eRegistration page.
(*First time registrants only. Cannot be combined with other offers.)

For more information and to register, visit www.go-esdc.com.



InfoSec World Conference & Expo 2010
April 19 & 20 in Orlando, Florida

InfoSec World features over 70 sessions, dozens of case studies, 9 tracks (including a hands-on hacking techniques track), 12 in-depth workshops, 3 co-located summits and an exhibit hall showcasing the industry's leading vendors. With the primary objective of providing top-notch education to all levels of information security and IT auditing professionals, InfoSec World delivers practical sessions that give you the tools to strengthen your security without restricting your business!

For more information and to register, visit www.misti.com/infosecworld.


"I wrote the book on that."
If you've written white papers, conducted professional seminars, or solved important real-world problems, you can probably write a book. It's not as difficult as you think. I invite you to submit a proposal for a book. Please click here for author guidelines or contact me at rich.ohanley@taylorandfrancis.com.

Subscribe
To get your own FREE subscription to IT Today, simply send me an e-mail. We maintain no personal information other than your e-mail address. We do not allow third-party use of the subscriber list.

Rich O'Hanley
Publisher
Auerbach Publications

PS -- To ensure safe delivery of Information Security Today, please add this e-mail address to your Safe Sender list: Auerbach_Publications@mail.vresp.com.



If you no longer wish to receive these emails, please reply to this message with "Unsubscribe" in the subject line or simply click on the following link: Unsubscribe



Click here to forward this email to a friend


Auerbach Publications
270 Madison Avenue
New York NY 10016
USA

Read the VerticalResponse marketing policy.

Try Email Marketing with VerticalResponse!

0 comments:

Post a Comment

Management Consultants