Search
  Advanced Search
Results
Total: 56 results found.
Refine your search by section:  Content (51)  Tags (3)  Menus (2)
Order by
  
Display
Conclusion: This research note sets out and describes the Security Leadership capability maturity model. In using this model, organisations must be honest about their current level before they can even speculate on the benefits of working towards a higher maturity level. Working towards higher levels of maturity has clear benefits for both IT and the ...
Section: Content | Category: Security Leadership | Date: Tuesday, 04 October 2016 | Hits: 681
Section: Menus
Section: Content
A security leader understands today’s cyber risks, how these apply to their organisation and market, and has management’s confidence to address these risks responsibly. A security leader guides the organisation through the realities of the new business environment, aligning the organisation’s practices and technologies to its risk appetite, and ensures ...
Section: Content | Category: Security Leadership | Date: Wednesday, 21 September 2016 | Hits: 524
Gain valuable insights into how security leaders are positioning cyber-security and risk within their organisations Be able to self-assess how your organisation measures up on the IBRS capability maturity model for security leadership Learn how to position cyber-security so that it is aligned to business priorities "This Master Advisory Presentation ...
Section: Content | Category: Security Leadership | Date: Wednesday, 21 September 2016 | Hits: 2744
Conclusion: In the IBRS Security Leadership capability maturity model, buying more product is level 2: Alienated, and is typified by IT teams that are struggling to take on the challenge of cyber security because they address it as a technical problem. Buying product without a clear understanding of the business risk it is aiming to address is a guarantee ...
Section: Content | Category: Vendors | Date: Saturday, 03 December 2016 | Hits: 178
... audited for cyber security has a number of nuances that are worth drawing out. Business risk: Cyber security is not merely an IT issue. Business involvement and alignment are also important to not only cyber security, but also to preparation for an audit. (See: Security Leadership MAP). Risk assessment: Organisations are expected to have an informed ...
Section: Content | Category: Security Leadership | Date: Friday, 03 February 2017 | Hits: 525
... are patched and other basic security operations are undertaken, then the security function is neutered and the organisation is at risk. Outreach: A frequently overlooked requirement for security leadership within organisations is an outreach function. At the larger end of the corporate scale, CBA, Telstra and Australia Post are just three of the local ...
Section: Content | Category: Sourcing & Staffing | Date: Tuesday, 30 June 2015 | Hits: 496
... experience at RSAC reflected my experiences at many other international cyber-security gatherings over the years. I have come to the conclusion that Australia has pockets of cyber-security leadership that are world-class, and in some instances, world-leading. But these pockets of capability – almost all at the top end of town – are insufficient for ...
Section: Content | Category: In The News | Date: Thursday, 05 May 2016 | Hits: 1120
... so highly now. Meanwhile, other, newer, players are sweeping up recognised industry figures, and CISOs are changing organisations. Growing risk awareness: At the same time that there is security leadership and skills churn in the local market, there is another market force emerging. A page from Cryptome notes a surprising number of publically listed ...
Section: Content | Category: Security Leadership | Date: Friday, 31 October 2014 | Hits: 443