Andrew Cooper

Corruption Prevention and Response

Recent, highly-publicised cyber incidents have made IT-related criminal acts of all types newsworthy, and severely tested the tolerance of the market (customers, regulators, and insurers) with organisations that suffer from them. As a result, organisations can no longer be satisfied with stopping or reacting to IT crime in ways that previously sufficed.

Read More »
Security

Not All Technology Crime is Cyber

Organisations are finally getting serious about cyber crime. But this is only one type of criminal activity, and IT departments must be equally vigilant against other types of crime.

Read More »

Maturity Models – Implementing for Impact

Maturity models are a highly effective tool for structuring, tracking and reporting the improvement in important process areas of an IT organisation. But how do you begin the journey, and how do you succeed in demonstrating reward for your efforts?
This article addresses how to implement maturity models. A previous article described what maturity models are and why they should be used.

Read More »
workshops

Maturity Models – What They Are and Why They Matter

These days, maturity models seem to be everywhere. IBRS alone has published scores of research articles utilising them. But what exactly are maturity models, what are they good for, and how can they be used effectively?
This article addresses what maturity models are and are not good for – a future article will address their use.

Read More »

Search