Main
Log in

Search
 
Results
Total: 254 results found.
Order by
  
Display
nformation security refers to the protection of sensitive company data and vital systems from external attacks, such as theft or destruction. Part one of this series explored how organisations can determine whether outsourcing information security to a Managed Security Service Provider (“MSSP”) would be the best way to identify, prevent and recover ...
Section: Content | Category: Sourcing & Staffing | Date: Wednesday, 31 December 2003 | Hits: 405
Conclusion: Organisations that do not treat information security risks seriously could pay a heavy price if a major incident occurs and they are unprepared to deal with it. Observations: In the last ten years the degree of interconnectedness through the Internet of organisations, their suppliers and customers and government, has increased dramatically. ...
Section: Content | Category: Security Leadership | Date: Wednesday, 28 July 2004 | Hits: 544
Conclusion: Despite the vendor and media hype around malware threats to the hypervisor, the biggest risk to IT departments from virtualisation is insufficient procedural controls. The risk stems from virtual machines being poorly managed, growing in number, and the consequent haemorrhage of money to support them. Virtual machines should be processed ...
Section: Content | Category: Security Leadership | Date: Thursday, 29 January 2009 | Hits: 628
Conclusion: Security professionals are valuable not only for what they know, but also for how they think. However, this style of thinking can often result in them being alienated for “being too negative”. An alienated security professional is a waste of resources, so CIOs should adopt DeBono’s Six Thinking Hats, a thinking exercise based on role-play, ...
Section: Content | Category: Security Leadership | Date: Thursday, 24 June 2010 | Hits: 700
Conclusion:The latest Verizon Data Breach Investigation report (2011) continues many of the themes drawn out since its first publication in 2008. However, the DBIR is not a best practice guide on how to secure organisational data; it is an aggregation of cases where organisations failed to secure theirs. Consequently, the DBIR should be viewed as a ...
Section: Content | Category: Security Leadership | Date: Thursday, 26 May 2011 | Hits: 954
Like any other sourcing transaction, relationships with Managed Security Service Providers (‘MSSPs’) that provide information security must be rationalised and planned by customers. Information security is an area of growing concern, but must be fully understood before a decision can be made regarding the approach an organisation will take to protect ...
Section: Content | Category: Sourcing & Staffing | Date: Friday, 28 November 2003 | Hits: 370
Conclusion: As cloud services - typically Software as a Service - become increasingly accepted, the IT industry is gaining valuable experience in the actual risks of putting data in the cloud. Most of these risks centre around data confidentiality. Knowing the actual risks, rather than the fear, uncertainty and doubt that vendors and security consultants ...
Section: Content | Category: Security Leadership | Date: Saturday, 28 January 2012 | Hits: 1049
Conclusion: IT security strategies are an invaluable resource as a means of coordinating security efforts and in improving funding approval for security projects – because they can be shown to be following a coherent consistent strategy. The process to create them is an overlooked source of value for the information that it uncovers. An IT security ...
Section: Content | Category: Security Leadership | Date: Wednesday, 28 March 2012 | Hits: 860
Conclusion: Every technology trend in the financial services sector (principally BYOD, changes in cybercrime, cloud, and DLP) has an aspect of identity and access management. IBRS research on the identity management market in Australia has found that there is a very small resource pool of sufficiently skilled practitioners. This means that the financial ...
Section: Content | Category: Security Leadership | Date: Saturday, 23 June 2012 | Hits: 880
Conclusion: Remediating major systems is not a job for the faint-hearted or over-confident IT managers. Poor governance decisions and excessive optimism can easily lead to project failures (and ruin careers). Conversely smart decisions combined with sound project leadership can increase the probability of success and enhance careers. Observations: ...
Section: Content | Category: Applications | Date: Wednesday, 25 June 2014 | Hits: 904

In the News

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Intel chip meltdown flaw shows new vulnerability - AFR - Jan 5th 2018

Cyber security experts have warned the long-term implications of chip vulnerabilities nicknamed Spectre and Meltdown discovered by researchers this week are still unknown, despite it appearing that...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

       
Recently Viewed Articles