Main
Log in

Search
 
Results
Total: 254 results found.
Order by
  
Display
... experience at RSAC reflected my experiences at many other international cyber-security gatherings over the years. I have come to the conclusion that Australia has pockets of cyber-security leadership that are world-class, and in some instances, world-leading. But these pockets of capability – almost all at the top end of town – are insufficient for ...
Section: Content | Category: In The News | Date: Thursday, 05 May 2016 | Hits: 1237
Conclusion: Much like the fable of the Boy Who Cried Wolf, the security industry has a limited number of opportunities to channel enterprise and national attention to cyber incidents. The WannaCry ransomware worm runs the risk of using up that credit for the security industry as so little impact was felt in Australia. The lack of local impact was more ...
Section: Content | Category: Security Leadership | Date: Sunday, 04 June 2017 | Hits: 457
... over the breach and a federal probe from two agencies. Its stock has lost more than a third of its value since the breach was disclosed.” (Source: USA Today, 15th September 2017.) As set out in the IBRS Security Leadership MAP, for a CEO, security leadership involves being a role model that sets the risk tolerance culture of the organisation, communicates ...
Section: Content | Category: Security Leadership | Date: Monday, 02 October 2017 | Hits: 409
Security is one of the fastest growing markets in technology and a huge boon for the channel, but many organisations struggle with cyber maturity due to misinformation and poor guidance from partners. In the latest IBRS Master Advisory Presentation - Security Leadership: A Fresh Perspective of cyber risk management in a hyper-connected world - the ...
Section: Content | Category: In The News | Date: Friday, 07 October 2016 | Hits: 859
... such IT departments can be viewed as a model which other business functions can emulate as they move towards “Everything-as-a-Service” business structures. Priority #2: Security leadership – As expected, security and risk grew as a priority area of focus in 2017. Oddly, this was not driven by Australia’s impending mandatory breach notification legislation, ...
Section: Content | Category: Governance & Planning | Date: Tuesday, 06 March 2018 | Hits: 319
... a self-service end user computing environment.14 Security leadership: Cyber-Security is a growing concern, largely due to greater awareness of the problem stemming from mandatory reporting regimes overseas, but also from greater exposure to security threats. However, the purpose and value15 of cyber-security are not well understood. Through 2016, ...
Section: Content | Category: Governance & Planning | Date: Monday, 01 February 2016 | Hits: 289
Security Leadership capability maturity model Running IT-as-a-Service Part 23: Digital world contact centres “ain’t” that digital Can ICT Vendors be Trusted Advisors? Innovation Investment: What the competition is doing Why cyber security concerns, like taxes, will not go away Keeping Digital initiatives on target Sourcing Monthly August 2016 ...
Section: Content | Category: Digital Digest | Date: Monday, 03 October 2016 | Hits: 301
... a business perspective (i. e. security leadership2), must be evaluated. Identifying and developing remediation strategies for these risks can benefit from external advisors, but ultimately must be owned by an internal coordinator. Thus, the skill sets assessing the risks of Cloud services must be internal, but may be developed with external help over ...
Section: Content | Category: Governance & Planning | Date: Thursday, 02 June 2016 | Hits: 412
Four technology forces will shape the business strategy in 2016, writes IBRS' Dr Joe Sweeney In the view of IBRS, four technology forces will shape business strategy in 2016: Mobility, the Post PC Era, and Future Workplace Innovation As-a-Service Security Leadership Data Driven Business ...
Section: Content | Category: In The News | Date: Thursday, 18 February 2016 | Hits: 1219
... externally) work environment. In addition, consider a “security leadership” program to move the organisation from treating risks as pure technical issue (e. g. cyber security) to a cultural issue. As organisations adopt greater external facing collaboration, the imperative is to become a “purpose driven culture” where all users are cognisant of, and ...
Section: Content | Category: Applications | Date: Friday, 01 April 2016 | Hits: 1267

In the News

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Intel chip meltdown flaw shows new vulnerability - AFR - Jan 5th 2018

Cyber security experts have warned the long-term implications of chip vulnerabilities nicknamed Spectre and Meltdown discovered by researchers this week are still unknown, despite it appearing that...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

       
Recently Viewed Articles