Risk Management

Security

How to Be a Risk-Ready CISO

Today’s information security leaders are quickly maturing into strategic business thinkers, growing beyond the traditional technical purpose of initiatives like implementing the latest firewalls or malware detection tools. The days of the CISO who is exclusively a highly-qualified network engineer have come to an end. Instead, the effective modern-day CISO has that strong technology foundation, […]

01.31.2017

Business People Planning Strategy Analysis Office Concept

Security

Assumption of Breach Part III—Policy and Process

In my last blog entry, I discussed the first of three foundational elements for a security program: all of the people who interact with your organization’s systems and data. In this post we’ll tackle the next element of cyber security—policy and process. For the purposes of this post, I am going to use these two […]

01.30.2017

Cloud computing

Cloud

Five Reasons to Explore a Hybrid Cloud Strategy

Cloud services are a great alternative for almost every company for many compute needs. Access to such services can be easy and rapid to obtain—many will even accept your credit card. Many tasks come to mind as being better from cloud sources like payroll and employee benefits, expense management and even CRM for smaller companies.  […]

01.24.2017

Business team discussing progress of the company

Professional Services

IT Directors and CIOs: Spend More Time Focusing On Leadership

It’s a well-known fact that the IT talent pool is ever-shrinking. In fact, just last year in Gartner’s 2016 CIO report, talent became recognized globally as the “single biggest issue” preventing CIOs from achieving their objectives. The story does not appear to be looking much better as we head into 2017. You May Also Like: […]

01.17.2017

Security concept with businessman and hacker hands on laptop keyboard.

Security

Assumption of Breach, Part II—The People Element

In the first installment of this series I discussed the need for organizations to change their approach to cyber security to an “assumption of breach model,” or an understanding that in today’s threat landscape, it is unrealistic to thwart 100 percent of malicious attacks. That previous post also mentioned that this new approach should focus […]

01.16.2017