Search
  Advanced Search
Results
Total: 56 results found.
Refine your search by section:  Content (51)  Tags (3)  Menus (2)
Order by
  
Display
Conclusion: It is undeniable that Cloud services will only become more important to organisations. However, executives must bear in mind that as increasing Cloud adoption meets an onslaught of cyber-attacks, regulators and courts will be looking for evidence that organisations exercised due care in vendor selection and support of information security ...
Section: Content | Category: Security Leadership | Date: Saturday, 01 August 2015 | Hits: 1282
nformation security refers to the protection of sensitive company data and vital systems from external attacks, such as theft or destruction. Part one of this series explored how organisations can determine whether outsourcing information security to a Managed Security Service Provider (“MSSP”) would be the best way to identify, prevent and recover ...
Section: Content | Category: Sourcing & Staffing | Date: Wednesday, 31 December 2003 | Hits: 377
Like any other sourcing transaction, relationships with Managed Security Service Providers (‘MSSPs’) that provide information security must be rationalised and planned by customers. Information security is an area of growing concern, but must be fully understood before a decision can be made regarding the approach an organisation will take to protect ...
Section: Content | Category: Sourcing & Staffing | Date: Friday, 28 November 2003 | Hits: 334
Conclusion: Dedicated IT security people are too expensive for SMB organisations. The market trend is towards outsourcing security tasks, and the SMB market must embrace this. Large organisations (500+ people) should make internal security people the managers of internal security programs, and managers of the relationship with managed security service ...
Section: Content | Category: Security Leadership | Date: Saturday, 28 April 2007 | Hits: 478
Conclusion: Security professionals are valuable not only for what they know, but also for how they think. However, this style of thinking can often result in them being alienated for “being too negative”. An alienated security professional is a waste of resources, so CIOs should adopt DeBono’s Six Thinking Hats, a thinking exercise based on role-play, ...
Section: Content | Category: Security Leadership | Date: Thursday, 24 June 2010 | Hits: 638
Conclusion:The latest Verizon Data Breach Investigation report (2011) continues many of the themes drawn out since its first publication in 2008. However, the DBIR is not a best practice guide on how to secure organisational data; it is an aggregation of cases where organisations failed to secure theirs. Consequently, the DBIR should be viewed as a ...
Section: Content | Category: Security Leadership | Date: Thursday, 26 May 2011 | Hits: 880
Conclusion: The Australian Institute of Management recognises that leadership and management will need to continue to evolve to keep up with technological innovation and globalisation. Whilst organisations are usually aware of the need to keep up with technological changes, they often struggle with the practical implications for management and impact ...
Section: Content | Category: Operations & Service Delivery | Date: Sunday, 29 January 2012 | Hits: 760
Conclusion: Big data and analytics projects can learn important lessons from the domain of information security analytics platforms. Two critical factors to consider when planning deployment of an analytics platform are: the need for a clear business objective and; the depth and duration of organisational commitment required. Without a clear understanding ...
Section: Content | Category: Governance & Planning | Date: Sunday, 31 May 2015 | Hits: 511
Conclusion: Every technology trend in the financial services sector (principally BYOD, changes in cybercrime, cloud, and DLP) has an aspect of identity and access management. IBRS research on the identity management market in Australia has found that there is a very small resource pool of sufficiently skilled practitioners. This means that the financial ...
Section: Content | Category: Security Leadership | Date: Saturday, 23 June 2012 | Hits: 809
Conclusion: Despite the apparent value of the DSD’s Top 35 Mitigation Strategies report, organisations considering executing its recommendations will have to weigh up the business impact of implementation. In some instances, a mitigation strategy may be too intrusive on business operations. For some, the cost of ongoing support may be too high. However, ...
Section: Content | Category: Security Leadership | Date: Thursday, 27 October 2011 | Hits: 822