Search
 
Results
Total: 254 results found.
Order by
  
Display
Conclusion: As cyber security gains awareness among business leaders, many organisations are undertaking new cyber risk management initiatives. However, these initiatives can be misdirected if business leaders are not clear on why they are doing them. On the journey to improving an organisation’s cyber security maturity, the question “why?” is a powerful ...
Section: Content | Category: Sourcing & Staffing | Date: Friday, 01 April 2016 | Hits: 275
Conclusion: Unless an organisation has an already strong cyber security capability, or the budget and appetite to progress its maturity very quickly through expanding its headcount and changing business processes, it is unlikely that any security tool purchases will help. Instead, organisations aspiring to improve their cyber security maturity should ...
Section: Content | Category: Security Leadership | Date: Tuesday, 02 February 2016 | Hits: 283
Conclusion: This month, discussions regarding analytics and data-driven innovation have been prominent. As the role of IT changes from providing technology solutions to driving business outcomes and strategy through the use of technology agile services to support business processes and targets are required. Companies have recognised that data handling ...
Section: Content | Category: Sourcing & Staffing | Date: Wednesday, 02 December 2015 | Hits: 331
Conclusion: The IT industry has hit a breaking point where the artificial grouping of information security and IT has left many organisations vulnerable. Business units have viewed information security as an IT problem, and IT has abdicated responsibility for many aspects of operations that should be viewed as basic hygiene. It is time for organisations ...
Section: Content | Category: Security Leadership | Date: Monday, 02 November 2015 | Hits: 446
Conclusion: CTOs need to balance natural technical strengths with traditional leadership skills such as strategic thinking and empathy with others to be initially recruited and then remain as successful CTOs. Observations: Successful CTOs are dedicated and naturally enjoy being in the weeds of technology. But they are required to raise their heads ...
Section: Content | Category: Sourcing & Staffing | Date: Monday, 03 July 2017 | Hits: 178
Conclusion: Remediating major systems is not a job for the faint-hearted or over-confident IT managers. Poor governance decisions and excessive optimism can easily lead to project failures (and ruin careers). Conversely smart decisions combined with sound project leadership can increase the probability of success and enhance careers. Observations: ...
Section: Content | Category: Applications | Date: Wednesday, 25 June 2014 | Hits: 833
37. Security
Section: Tags | Date: Sunday, 31 May 2015 | Hits: 99
Conclusion: Despite increasing focus on information and data in an as-a-Service age, thought leadership in the data management discipline has waned. Today, few of the frameworks, methods and bodies of knowledge that emerged either from the data modelling fraternity or the records management community in the last decade remain active. This leaves organisations ...
Section: Content | Category: Governance & Planning | Date: Wednesday, 02 August 2017 | Hits: 68
Conclusion: Staff remember how leaders behave and react during a crisis, rather than when the business is operating successfully. Astute leaders do not just deal with restoration and getting the business back on deck; they also support their staff during and after the crisis and can even create the potential for the organisation to be in a better state ...
Section: Content | Category: Governance & Planning | Date: Sunday, 01 January 2017 | Hits: 885
Conclusion: Bugcrowd, Hivint, Kasada, and Secure Code Warrior each has a proven capability to address an important aspect of the cyber defences of Australian organisations. The Australian Cyber Security Strategy, launched in April 2016, advocates the promotion of local capabilities where Australia can build globally competitive solutions. These four ...
Section: Content | Category: Security Leadership | Date: Sunday, 01 January 2017 | Hits: 559