BT Technology Journal - Archive


Operational Risk Management

BT Technology Journal | Vol 25 No 1 | January 2007

BT Technology Journal

In recent years, increased regulation plus demands from customers for greater transparency, attested evidence of compliance, and good risk management processes, have driven organisations to achieve a better and more sustainable approach to managing risks.
>> More


SECTION 1

Editorial


Arrow

B Garratt

Dilemmas, uncertainty, risks, and board performance

Thank you!

Arrow

M Drew

Information risk management and compliance - expect the unexpected

Thank you!

Arrow

A Jones

A framework for the management of information security risks

Thank you!

Arrow

S Rycroft and M Tully

Building an information security Meta Standard

Thank you!

Arrow

J K Himmelreich

A compliance office for heavily regulated enterprises - a best practice approach to meeting US FDA requirements

Thank you!

Arrow

B Ashford

How benchmarking can mitigate risk in business transformation

Thank you!

Arrow

P R H Burrington

Commercial implications of operational risk for service-based contracts

Thank you!

Arrow

A H Edmiston

The role of systems and applications monitoring in operational risk management

Thank you!

Arrow

C Colwill and A Gray

Creating an effective security risk model for outsourcing decisions

Thank you!

Arrow

G Evans and S Benton

The BT Risk Cockpit - a visual approach to ORM

Thank you!

Arrow

F den Braber, I Hogganvik, M S Lund, K Stølen and F Vraalsen

Model-based security analysis in seven steps - a guided tour to the CORAS method

Thank you!

Arrow

V Page, M Dixon and I Choudhury

Security risk mitigation for information systems

Thank you!

Arrow

A Baldwin, Y Beres and S Shiu

Using assurance models to aid the risk and governance life cycle

Thank you!

Arrow

P Kearney and L Brügger

A risk-driven security analysis method and modelling language

Thank you!

Arrow

B Azvine, Z Cui, B Majeed and M Spott

Operational risk management with real-time business intelligence

Thank you!

Arrow

P W Warren and N J Davies

Managing the risks from information - through semantic information management

Thank you!

Arrow

S D Wolthusen

Automated extraction of behavioural profiles from document usage

Thank you!

Arrow

H Read and A Blyth

Risk management - visual IDS countermeasures

Thank you!

Arrow

D Brown

Horizon scanning and the business environment

Thank you!