Search
 
Results
Total: 254 results found.
Order by
  
Display
Conclusion: Dedicated IT security people are too expensive for SMB organisations. The market trend is towards outsourcing security tasks, and the SMB market must embrace this. Large organisations (500+ people) should make internal security people the managers of internal security programs, and managers of the relationship with managed security service ...
Section: Content | Category: Security Leadership | Date: Saturday, 28 April 2007 | Hits: 515
Conclusion: Every technology trend in the financial services sector (principally BYOD, changes in cybercrime, cloud, and DLP) has an aspect of identity and access management. IBRS research on the identity management market in Australia has found that there is a very small resource pool of sufficiently skilled practitioners. This means that the financial ...
Section: Content | Category: Security Leadership | Date: Saturday, 23 June 2012 | Hits: 845
nformation security refers to the protection of sensitive company data and vital systems from external attacks, such as theft or destruction. Part one of this series explored how organisations can determine whether outsourcing information security to a Managed Security Service Provider (“MSSP”) would be the best way to identify, prevent and recover ...
Section: Content | Category: Sourcing & Staffing | Date: Wednesday, 31 December 2003 | Hits: 386
Conclusion: Big data and analytics projects can learn important lessons from the domain of information security analytics platforms. Two critical factors to consider when planning deployment of an analytics platform are: the need for a clear business objective and; the depth and duration of organisational commitment required. Without a clear understanding ...
Section: Content | Category: Governance & Planning | Date: Sunday, 31 May 2015 | Hits: 562
Conclusion: It is undeniable that Cloud services will only become more important to organisations. However, executives must bear in mind that as increasing Cloud adoption meets an onslaught of cyber-attacks, regulators and courts will be looking for evidence that organisations exercised due care in vendor selection and support of information security ...
Section: Content | Category: Security Leadership | Date: Saturday, 01 August 2015 | Hits: 1514
Conclusion: IT security strategies are an invaluable resource as a means of coordinating security efforts and in improving funding approval for security projects – because they can be shown to be following a coherent consistent strategy. The process to create them is an overlooked source of value for the information that it uncovers. An IT security ...
Section: Content | Category: Security Leadership | Date: Wednesday, 28 March 2012 | Hits: 828
Conclusion: The Australian Institute of Management recognises that leadership and management will need to continue to evolve to keep up with technological innovation and globalisation. Whilst organisations are usually aware of the need to keep up with technological changes, they often struggle with the practical implications for management and impact ...
Section: Content | Category: Operations & Service Delivery | Date: Sunday, 29 January 2012 | Hits: 782
Conclusion: As cloud services - typically Software as a Service - become increasingly accepted, the IT industry is gaining valuable experience in the actual risks of putting data in the cloud. Most of these risks centre around data confidentiality. Knowing the actual risks, rather than the fear, uncertainty and doubt that vendors and security consultants ...
Section: Content | Category: Security Leadership | Date: Saturday, 28 January 2012 | Hits: 1004
Conclusion: Despite the apparent value of the DSD’s Top 35 Mitigation Strategies report, organisations considering executing its recommendations will have to weigh up the business impact of implementation. In some instances, a mitigation strategy may be too intrusive on business operations. For some, the cost of ongoing support may be too high. However, ...
Section: Content | Category: Security Leadership | Date: Thursday, 27 October 2011 | Hits: 863
Conclusion: Non-IT executives are often reported as being concerned about the prospect of a cyber incident, but as security is not their area of expertise, responsibility for mitigation and preparation is often devolved to IT. This is a mistake, because as much as lack of any security could be devastating, applying the wrong controls to an organisation ...
Section: Content | Category: Governance & Planning | Date: Wednesday, 02 September 2015 | Hits: 517