Strategy and managing IS - general ICT topics
Friday, 17. October 2014., 09:00
Hall 3 Restaurant
It is understood that our information security management system is used for organized access to information resources - space, equipment, communications infrastructure and applications, or information in any form by applying known CIA model.
Most of the solutions are implemented in practice by using the built-in models in software and/or hardware. We can say that is normally implied. However, we forget from time to time the real value of intellectual property, trade secrets and personal information. The value of an organization is not only measured by bookkeeping methods but also the carrying value of intellectual capital.