Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

TOP TECHNOLOGY INITIATIVES

1. Information Security Management - is the process of protecting an organization’s data and


assets against potential threats. One of the primary goals of these processes is to protect data
confidentiality, integrity, and availability
→ describes the set of policies and procedural controls that IT and business organizations
implement to secure their informational assets against threats and vulnerabilities

2. IT Governance - defined as the processes that ensure the effective and efficient use of IT in
enabling an organization to achieve its goals
→ is putting structure around how organizations align IT strategy with business strategy,
ensuring that companies stay on track to achieve their strategies and goals, and
implementing good ways to measure IT's performance

3. Business Continuity Management (CBM) & Disaster Recovery Planning - is a framework for
identifying an organization's risk of exposure to internal and external threats.
→ The goal of BCM is to provide the organization with the ability to effectively respond to
threats such as natural disasters or data breaches and protect the business interests of the
organization. BCM includes disaster recovery, business recovery, crisis management,
incident management, emergency management and contingency planning.
→ A disaster recovery plan (DRP) is a formal document created by an organization that
contains detailed instructions on how to respond to unplanned incidents such as natural
disasters, power outages, cyber-attacks and any other disruptive events.

4. Privacy Management - is defined as the system for protecting personal or proprietary


information and data from unauthorized viewers. For many companies that manage large amounts
of customer information, particularly those involved in financial industries, privacy management
is vital to protecting the identities and personal information of multiple consumers. Privacy
management at the corporate level is generally handled by a network security team or a security
vendor that monitors communications and servers to make sure this information stays safe.

5. Business Process Improvement (BPI) Workflow and Process Exception Alerts - the analysis,
review, and improvement of existing business processes. This is done by mapping out the
business process, identifying inefficiencies, redesigning the process & benchmarking to initial
metrics
→ is an approach used to identify and evaluate inefficiencies within the organization; It
redesigns existing business tasks, improving their effectiveness, enhances the workflows
involved, and optimizes performance.
→ Exception Alerts – this is a basic trigger that enables exception monitoring for the
current business process.

6. Identity and Access Management - is a framework of business processes, policies and


technologies that facilitates the management of electronic or digital identities. With an IAM
framework in place, information technology (IT) managers can control user access to critical
information within their organizations. Systems used for IAM include single sign-on systems,
two-factor authentication, multifactor authentication and privileged access management. These
technologies also provide the ability to securely store identity and profile data as well as data
governance functions to ensure that only data that is necessary and relevant is shared.

7. Conforming to assurance & compliance standards


8. Business Intelligence (BI) - is a technology-driven process for analyzing data and delivering
actionable information that helps executives, managers and workers make informed business
decisions

9. Mobile and Remote Computing - The ability to use technology in remote or mobile (non static)
environments. This technology is based on the use of battery powered, portable, and wireless
computing and communication devices, like smart mobile phones, wearable computers and
personal digital assistants (PDAs)

10. Document, & Knowledge Management


→ Document management systems provide essential records and archives for explicit
company information. In other words, these systems are information and data
management tools that track and store a wide variety of documents. Like digital file
cabinets, the content of these file systems is broad and contain current and archived
versions.
→ Knowledge management is The process of managing knowledge and information within
a business by documenting, utilizing, and sharing knowledge and experience of
employees. It provides a variety of tools and resources to help employees find
information and share knowledge. 

You might also like