Search
  Advanced Search
Results
Total: 56 results found.
Refine your search by section:  Content (51)  Tags (3)  Menus (2)
Order by
  
Display
Security is one of the fastest growing markets in technology and a huge boon for the channel, but many organisations struggle with cyber maturity due to misinformation and poor guidance from partners. In the latest IBRS Master Advisory Presentation - Security Leadership: A Fresh Perspective of cyber risk management in a hyper-connected world - the ...
Section: Content | Category: In The News | Date: Friday, 07 October 2016 | Hits: 455
Security Leadership capability maturity model Running IT-as-a-Service Part 23: Digital world contact centres “ain’t” that digital Can ICT Vendors be Trusted Advisors? Innovation Investment: What the competition is doing Why cyber security concerns, like taxes, will not go away Keeping Digital initiatives on target Sourcing Monthly August 2016 ...
Section: Content | Category: Digital Digest | Date: Monday, 03 October 2016 | Hits: 102
... externally) work environment. In addition, consider a “security leadership” program to move the organisation from treating risks as pure technical issue (e. g. cyber security) to a cultural issue. As organisations adopt greater external facing collaboration, the imperative is to become a “purpose driven culture” where all users are cognisant of, and ...
Section: Content | Category: Applications | Date: Friday, 01 April 2016 | Hits: 1060
... a self-service end user computing environment.14 Security leadership: Cyber-Security is a growing concern, largely due to greater awareness of the problem stemming from mandatory reporting regimes overseas, but also from greater exposure to security threats. However, the purpose and value15 of cyber-security are not well understood. Through 2016, ...
Section: Content | Category: Governance & Planning | Date: Monday, 01 February 2016 | Hits: 156
... a business perspective (i. e. security leadership2), must be evaluated. Identifying and developing remediation strategies for these risks can benefit from external advisors, but ultimately must be owned by an internal coordinator. Thus, the skill sets assessing the risks of Cloud services must be internal, but may be developed with external help over ...
Section: Content | Category: Governance & Planning | Date: Thursday, 02 June 2016 | Hits: 136
Four technology forces will shape the business strategy in 2016, writes IBRS' Dr Joe Sweeney In the view of IBRS, four technology forces will shape business strategy in 2016: Mobility, the Post PC Era, and Future Workplace Innovation As-a-Service Security Leadership Data Driven Business ...
Section: Content | Category: In The News | Date: Thursday, 18 February 2016 | Hits: 1008
Conclusion: Awareness of risks and threats, by itself, is not enough to protect an organisation. Security awareness campaigns are a sustained attempt at behaviour modification. But behaviour modification works best when an individual is not resisting the change. This means that the first step for any security awareness campaign must be to assess employee ...
Section: Content | Category: Security Leadership | Date: Thursday, 29 January 2015 | Hits: 625
Conclusion: as cyber-security becomes a board-level topic, organisations in the A/NZ region are feeling the pinch of the security skills shortage. In this environment, moving IT services to the Cloud has the potential to streamline and/or automate some basic IT security practices. Cloud services are not an IT security silver bullet, but for many organisations, ...
Section: Content | Category: Security Leadership | Date: Sunday, 01 March 2015 | Hits: 497
Conclusion: The role of a cyber security executive is challenging at the best of times, as they need to continually strike a balance between informing and influencing, without continually alarming. But the context surrounding why an organisation creates a cyber security executive role is critical to the success of cyber risk management. Executive level ...
Section: Content | Category: Security Leadership | Date: Saturday, 02 January 2016 | Hits: 404
Conclusion: Security incident and event management (SIEM) products can deliver solid insights into the security status of an organisation’s network. However, SIEM requires ongoing support, mature change control processes, and rapid and open communications between diverse teams within the IT department - as well as the rest of the organisation! A successful ...
Section: Content | Category: Security Leadership | Date: Thursday, 24 January 2013 | Hits: 803