Search
 
Results
Total: 254 results found.
Order by
  
Display
Conclusion: This month, discussions regarding analytics and data-driven innovation have been prominent. As the role of IT changes from providing technology solutions to driving business outcomes and strategy through the use of technology agile services to support business processes and targets are required. Companies have recognised that data handling ...
Section: Content | Category: Sourcing & Staffing | Date: Wednesday, 02 December 2015 | Hits: 384
Conclusion: Bugcrowd, Hivint, Kasada, and Secure Code Warrior each has a proven capability to address an important aspect of the cyber defences of Australian organisations. The Australian Cyber Security Strategy, launched in April 2016, advocates the promotion of local capabilities where Australia can build globally competitive solutions. These four ...
Section: Content | Category: Security Leadership | Date: Sunday, 01 January 2017 | Hits: 595
Conclusion: To be effective a cyber security program that controls access to hardware, software and data needs to be comprehensive and include all stakeholders. The challenge for IT and line management is to shape the message to the audience in terms they understand so they take their responsibilities seriously. Observations: Today’s print and online ...
Section: Content | Category: Security Leadership | Date: Tuesday, 04 October 2016 | Hits: 1569
Conclusion: Cyber security can be perceived by outsiders as an occult domain. Psychologically, people can respond in many ways to something they do not understand with responses ranging from denial to fear. Consequently, a frequent challenge to better security maturity is inertia, rooted in ignorance. It is imperative that security practitioners break ...
Section: Content | Category: Security Leadership | Date: Thursday, 05 May 2016 | Hits: 388
Conclusion: Staff remember how leaders behave and react during a crisis, rather than when the business is operating successfully. Astute leaders do not just deal with restoration and getting the business back on deck; they also support their staff during and after the crisis and can even create the potential for the organisation to be in a better state ...
Section: Content | Category: Governance & Planning | Date: Sunday, 01 January 2017 | Hits: 933
Conclusion: Unless an organisation has an already strong cyber security capability, or the budget and appetite to progress its maturity very quickly through expanding its headcount and changing business processes, it is unlikely that any security tool purchases will help. Instead, organisations aspiring to improve their cyber security maturity should ...
Section: Content | Category: Security Leadership | Date: Tuesday, 02 February 2016 | Hits: 329
Conclusion: The IT industry has hit a breaking point where the artificial grouping of information security and IT has left many organisations vulnerable. Business units have viewed information security as an IT problem, and IT has abdicated responsibility for many aspects of operations that should be viewed as basic hygiene. It is time for organisations ...
Section: Content | Category: Security Leadership | Date: Monday, 02 November 2015 | Hits: 513
Conclusion: The ability to inspire as a leader is becoming more recognised as a core management and leadership skill. What does not change overnight are the most innermost core values of how an inspirational leader behaves. Through their leadership they inspire others to perform and succeed, making a positive difference not just internally within the ...
Section: Content | Category: Sourcing & Staffing | Date: Thursday, 02 November 2017 | Hits: 139
39. Security
Section: Tags | Date: Sunday, 31 May 2015 | Hits: 121
Conclusion: There are two compelling information security reasons for creating a sense of purpose and ownership within an organisation. The first is that a sense of purpose and ownership will empower staff so that they move from responding to basic security hygiene matters, towards pre-empting issues. The second reason is so that organisations look ...
Section: Content | Category: Sourcing & Staffing | Date: Saturday, 03 October 2015 | Hits: 313