Search
  Advanced Search
Results
Total: 256 results found.
Refine your search by section:  Content (251)  Tags (3)  Menus (2)
Order by
  
Display
... experience at RSAC reflected my experiences at many other international cyber-security gatherings over the years. I have come to the conclusion that Australia has pockets of cyber-security leadership that are world-class, and in some instances, world-leading. But these pockets of capability – almost all at the top end of town – are insufficient for ...
Section: Content | Category: In The News | Date: Thursday, 05 May 2016 | Hits: 1138
Security is one of the fastest growing markets in technology and a huge boon for the channel, but many organisations struggle with cyber maturity due to misinformation and poor guidance from partners. In the latest IBRS Master Advisory Presentation - Security Leadership: A Fresh Perspective of cyber risk management in a hyper-connected world - the ...
Section: Content | Category: In The News | Date: Friday, 07 October 2016 | Hits: 706
Security Leadership capability maturity model Running IT-as-a-Service Part 23: Digital world contact centres “ain’t” that digital Can ICT Vendors be Trusted Advisors? Innovation Investment: What the competition is doing Why cyber security concerns, like taxes, will not go away Keeping Digital initiatives on target Sourcing Monthly August 2016 ...
Section: Content | Category: Digital Digest | Date: Monday, 03 October 2016 | Hits: 168
... externally) work environment. In addition, consider a “security leadership” program to move the organisation from treating risks as pure technical issue (e. g. cyber security) to a cultural issue. As organisations adopt greater external facing collaboration, the imperative is to become a “purpose driven culture” where all users are cognisant of, and ...
Section: Content | Category: Applications | Date: Friday, 01 April 2016 | Hits: 1118
... a business perspective (i. e. security leadership2), must be evaluated. Identifying and developing remediation strategies for these risks can benefit from external advisors, but ultimately must be owned by an internal coordinator. Thus, the skill sets assessing the risks of Cloud services must be internal, but may be developed with external help over ...
Section: Content | Category: Governance & Planning | Date: Thursday, 02 June 2016 | Hits: 203
... a self-service end user computing environment.14 Security leadership: Cyber-Security is a growing concern, largely due to greater awareness of the problem stemming from mandatory reporting regimes overseas, but also from greater exposure to security threats. However, the purpose and value15 of cyber-security are not well understood. Through 2016, ...
Section: Content | Category: Governance & Planning | Date: Monday, 01 February 2016 | Hits: 202
Four technology forces will shape the business strategy in 2016, writes IBRS' Dr Joe Sweeney In the view of IBRS, four technology forces will shape business strategy in 2016: Mobility, the Post PC Era, and Future Workplace Innovation As-a-Service Security Leadership Data Driven Business ...
Section: Content | Category: In The News | Date: Thursday, 18 February 2016 | Hits: 1142
Conclusion: Security leaders should approach security frameworks as a challenge to how the organisation secures its information assets. So, security leaders should be able to defend adherence, or variation, from any point on a chosen framework. Variance may be critical for business function, but the security leader needs to know this and be able to ...
Section: Content | Category: Security Leadership | Date: Wednesday, 01 October 2014 | Hits: 430
Conclusion: The role of a cyber security executive is challenging at the best of times, as they need to continually strike a balance between informing and influencing, without continually alarming. But the context surrounding why an organisation creates a cyber security executive role is critical to the success of cyber risk management. Executive level ...
Section: Content | Category: Security Leadership | Date: Saturday, 02 January 2016 | Hits: 436
Conclusion: Security awareness programs are an attempt to change staff behaviour for the protection of an organisation’s information assets, and also an attempt to change corporate culture to support and encourage desirable behaviours. However, security awareness programs also run the risk of overwhelming staff with too much fear, uncertainly, and doubt. ...
Section: Content | Category: Security Leadership | Date: Saturday, 04 March 2017 | Hits: 77