Search
 
Results
Total: 254 results found.
Order by
  
Display
... so highly now. Meanwhile, other, newer, players are sweeping up recognised industry figures, and CISOs are changing organisations. Growing risk awareness: At the same time that there is security leadership and skills churn in the local market, there is another market force emerging. A page from Cryptome notes a surprising number of publically listed ...
Section: Content | Category: Security Leadership | Date: Friday, 31 October 2014 | Hits: 498
Conclusion: Much like the fable of the Boy Who Cried Wolf, the security industry has a limited number of opportunities to channel enterprise and national attention to cyber incidents. The WannaCry ransomware worm runs the risk of using up that credit for the security industry as so little impact was felt in Australia. The lack of local impact was more ...
Section: Content | Category: Security Leadership | Date: Sunday, 04 June 2017 | Hits: 349
... experience at RSAC reflected my experiences at many other international cyber-security gatherings over the years. I have come to the conclusion that Australia has pockets of cyber-security leadership that are world-class, and in some instances, world-leading. But these pockets of capability – almost all at the top end of town – are insufficient for ...
Section: Content | Category: In The News | Date: Thursday, 05 May 2016 | Hits: 1180
Security is one of the fastest growing markets in technology and a huge boon for the channel, but many organisations struggle with cyber maturity due to misinformation and poor guidance from partners. In the latest IBRS Master Advisory Presentation - Security Leadership: A Fresh Perspective of cyber risk management in a hyper-connected world - the ...
Section: Content | Category: In The News | Date: Friday, 07 October 2016 | Hits: 765
Security Leadership capability maturity model Running IT-as-a-Service Part 23: Digital world contact centres “ain’t” that digital Can ICT Vendors be Trusted Advisors? Innovation Investment: What the competition is doing Why cyber security concerns, like taxes, will not go away Keeping Digital initiatives on target Sourcing Monthly August 2016 ...
Section: Content | Category: Digital Digest | Date: Monday, 03 October 2016 | Hits: 235
16. Advisors
... and panel participant. He is the author of the IBRS Security Leadership MAP. James is frequently quoted in the media on industry issues, and is the longest serving cyber security industry analyst in the Asia Pacific region. He contributes a regular opinion piece for the Australian Financial Review covering issues in the local cyber security industry. ...
Section: Content | Category: Website Information | Date: Friday, 17 October 2014 | Hits: 8583
... a business perspective (i. e. security leadership2), must be evaluated. Identifying and developing remediation strategies for these risks can benefit from external advisors, but ultimately must be owned by an internal coordinator. Thus, the skill sets assessing the risks of Cloud services must be internal, but may be developed with external help over ...
Section: Content | Category: Governance & Planning | Date: Thursday, 02 June 2016 | Hits: 272
... externally) work environment. In addition, consider a “security leadership” program to move the organisation from treating risks as pure technical issue (e. g. cyber security) to a cultural issue. As organisations adopt greater external facing collaboration, the imperative is to become a “purpose driven culture” where all users are cognisant of, and ...
Section: Content | Category: Applications | Date: Friday, 01 April 2016 | Hits: 1191
... a self-service end user computing environment.14 Security leadership: Cyber-Security is a growing concern, largely due to greater awareness of the problem stemming from mandatory reporting regimes overseas, but also from greater exposure to security threats. However, the purpose and value15 of cyber-security are not well understood. Through 2016, ...
Section: Content | Category: Governance & Planning | Date: Monday, 01 February 2016 | Hits: 242
Four technology forces will shape the business strategy in 2016, writes IBRS' Dr Joe Sweeney In the view of IBRS, four technology forces will shape business strategy in 2016: Mobility, the Post PC Era, and Future Workplace Innovation As-a-Service Security Leadership Data Driven Business ...
Section: Content | Category: In The News | Date: Thursday, 18 February 2016 | Hits: 1164