Quantcast
Channel: In Defense of Data » IT GRC
Browsing all 8 articles
Browse latest View live

CISOs: Make the Most of Your Time in the Boardroom

People in IT leadership roles, including CIOs and CISOs, typically only have five to eight minutes of time to present in Board of Director meetings, according to the latest research from the IT Policy...

View Article



Practical Risk Management – Part 2

Tackling Risk Management, One Step at a Time In part one of the series I explained why information security programs should include practical risk management as a key component. In this post I will...

View Article

How to Get More $ for Security

IT compliance may not be as thrilling as the latest Tablet computer or Smartphone that users are bringing into your organization. However, for many organizations it’s the main driver for justifying IT...

View Article

Practical Risk Management – Part 3

Recommendations for Implementing a Practical Risk Management Program This final post in the series will be some recommendations on “how” to implement a practical risk management in your organization....

View Article

Vendor Risk Management in the Age of Everything-as-a-Service

Organizations now have more choices available than ever before when it comes to outsourcing information management and IT resources to third party vendors.  Cloud computing and everything-as-a-service...

View Article


IT and Business Working Together for Better Compliance

Organizations worldwide are taking stock of their IT risk management plans. At one time, audits were the driving force behind companies examining their IT risk factors to ensure they were in compliance...

View Article

Define a Communications Strategy for Risk Mitigation

A CISO usually has about 5-8 minutes in a board room to communicate risk in business terms. Not a lot of time, so CISOs must ensure they use their time wisely. This is equally important when...

View Article

Big Data = Better Decision Making = Better Security

When the words “big data” and “security” are used together in a sentence, usually the word “problem” or “concern” is in there too. Security is often thought of as a prohibitor to using big data, since...

View Article

Browsing all 8 articles
Browse latest View live




Latest Images