Search
  Advanced Search
Results
Total: 56 results found.
Refine your search by section:  Content (51)  Tags (3)  Menus (2)
Order by
  
Display
Conclusion: As cyber security gains awareness among business leaders, many organisations are undertaking new cyber risk management initiatives. However, these initiatives can be misdirected if business leaders are not clear on why they are doing them. On the journey to improving an organisation’s cyber security maturity, the question “why?” is a powerful ...
Section: Content | Category: Sourcing & Staffing | Date: Friday, 01 April 2016 | Hits: 162
Conclusion: Bugcrowd, Hivint, Kasada, and Secure Code Warrior each has a proven capability to address an important aspect of the cyber defences of Australian organisations. The Australian Cyber Security Strategy, launched in April 2016, advocates the promotion of local capabilities where Australia can build globally competitive solutions. These four ...
Section: Content | Category: Vendors | Date: Sunday, 01 January 2017 | Hits: 258
Conclusion: It is undeniable that Cloud services will only become more important to organisations. However, executives must bear in mind that as increasing Cloud adoption meets an onslaught of cyber-attacks, regulators and courts will be looking for evidence that organisations exercised due care in vendor selection and support of information security ...
Section: Content | Category: Security Leadership | Date: Saturday, 01 August 2015 | Hits: 1229
34. Security
Section: Tags | Date: Sunday, 31 May 2015 | Hits: 44
Conclusion: Staff remember how leaders behave and react during a crisis, rather than when the business is operating successfully. Astute leaders do not just deal with restoration and getting the business back on deck; they also support their staff during and after the crisis and can even create the potential for the organisation to be in a better state ...
Section: Content | Category: Governance & Planning | Date: Sunday, 01 January 2017 | Hits: 427
Conclusion: To be effective a cyber security program that controls access to hardware, software and data needs to be comprehensive and include all stakeholders. The challenge for IT and line management is to shape the message to the audience in terms they understand so they take their responsibilities seriously. Observations: Today’s print and online ...
Section: Content | Category: Security Leadership | Date: Tuesday, 04 October 2016 | Hits: 1038
Conclusion: Cyber security can be perceived by outsiders as an occult domain. Psychologically, people can respond in many ways to something they do not understand with responses ranging from denial to fear. Consequently, a frequent challenge to better security maturity is inertia, rooted in ignorance. It is imperative that security practitioners break ...
Section: Content | Category: Security Leadership | Date: Thursday, 05 May 2016 | Hits: 195
Conclusion: Despite the vendor and media hype around malware threats to the hypervisor, the biggest risk to IT departments from virtualisation is insufficient procedural controls. The risk stems from virtual machines being poorly managed, growing in number, and the consequent haemorrhage of money to support them. Virtual machines should be processed ...
Section: Content | Category: Security Leadership | Date: Thursday, 29 January 2009 | Hits: 534
Conclusion: Organisations that do not treat information security risks seriously could pay a heavy price if a major incident occurs and they are unprepared to deal with it. Observations: In the last ten years the degree of interconnectedness through the Internet of organisations, their suppliers and customers and government, has increased dramatically. ...
Section: Content | Category: Security Leadership | Date: Wednesday, 28 July 2004 | Hits: 491
Conclusion: Big data and analytics projects can learn important lessons from the domain of information security analytics platforms. Two critical factors to consider when planning deployment of an analytics platform are: the need for a clear business objective and; the depth and duration of organisational commitment required. Without a clear understanding ...
Section: Content | Category: Governance & Planning | Date: Sunday, 31 May 2015 | Hits: 493