How and When to Quantify Information Risk

CEB IT

Most people think of risk quantification as the practice of assigning a dollar value to information risk, but even ranking different types of risk into an ordinal scale (first, second, third, etc) involve a degree of quantification.

10 New Information Security Roles for the Digitization Era

CEB IT

High demand and a limited pool of people with the right skills and experience make information security staffing a perennial challenge. Further complicating things is the fact that information security teams have not yet adapted to their changing role in digitizing companies.

Trending Sources

The 6 Reasons Employees are Lax about Information Security

CEB IT

Information security teams can spend all the money in their budget on fancy technology but it’s for naught if employees don’t use it. Blog Collaborate Across the Organization Information and Data Risk Management Information Risk Information Technology

Information Security: What You Should Know About Agile, DevOps, and Continuous Delivery

CEB IT

10 Ways Digitalization is Upending Information Security. A recent survey of around two dozen heads of information security produced a useful overview of the nature of this problem and how some of the world’s most forward-thinking teams are responding.

Drowning in Data, Starved for Information

Eric D. Brown

In his 1982 book Megatrends, John Naisbitt wrote “We are drowning in information but starved for knowledge.” Today, we are drowning in data and starved for information. Data is useless unless you can convert it to information and ultimately into knowledge.

IT Infrastructure: 3 Steps to Respond to Today’s Information Security Concerns

CEB IT

Don’t (just) focus on new technology : Infrastructure organizations continue to increase their spending on information security solutions as their primary strategy for improving security.

3 Ways to Protect Firms’ Information Security as they Digitize

CEB IT

The way companies create, sell, and market products, and run the operations to do so, is increasingly based on the use of technology and digital information (see chart 1), and this trend of digitization will only continue more quickly across the next five years.

How information security professionals can help business understand cyber risk

Computer Weekly

Information security is continually moving up business and board agendas, but information security professionals find it challenging to help business leaders to understand fully the cyber risks across increasingly digital businesses

Creating a Culture of Information Security

Data Center Knowledge

Organizations need to start thinking about information security as an element that enables businesses, facilitating increased competitive advantage that allows them to manage risk and protect all of the dollars that have been spent on creating a brand.

Information Security: The 8 Types of Risk Assessment You Should Know About

CEB IT

Chart 1 below can help with understanding the different types of risk assessment that information security teams need to conduct, and may also help explain the process, and the importance of it, to colleagues.

Information Risk: Third-Party Risk Management Is Failing

CEB IT

Information security teams are busier than they’ve ever been and, although they have been given more funds to cope, there is still a great need to prioritize and focus on the risks that are most likely to harm their business.

The Universe of The Chief Information Officer

A CIO's Voice

Filed under: C-Level Executives , CIO , CIO/CTO , IT Process , Management Tagged: Alignment , CEO , CFO , Chief Information Officer , CIO , CIO Leader , CMO , COO , corporate innovation , culture , executive , leader , Management.

66

Inform your federal growth strategy with Opptiv

CTOvision

This is a Cognitio sponsored post, Contact Us for information on sponsoring your content. . By Bob Gourley. Opptiv is a sponsor of Cognitio''s 30 April 2015 Synergy Forum.

PowerShell: Pulling information from MSP files

Mick's IT Blog

The key information that helped me what from Microsoft's Installer.OpenDatabase method webpage. The script below was written for obtaining information from an MSP pertaining to Microsoft Office updates. Recently, I began making significant updates to one of my other scripts on here.

Adobe 63

Information Risk: How to Manage the Company’s Demand for Your Services

CEB IT

Information security teams face an unprecedented level of demand for their services right now. The strain on the time and resources of information security teams is understandable ( as Yahoo can attest ), and even though their companies are stumping up money, information security budget growth is slowing. Automating operations and governance activities offers the best chance to meet information security demands.

Agile 39

Information Risk: 3 Threat Management Trends to Keep an Eye On

CEB IT

Although the threat management tools and techniques available to chief information security officers (CISOs) have also improved, this still leaves much to do. However, by the time information security teams respond, attackers have most likely already caused a lot of damage.

Tools 33

CESG issues challenge to information security professionals

Computer Weekly

CESG technical director Jonathan Lawrence tells The Cyber Security Summit that information security professionals need to deliver security controls that help business users achieve their goals securely

Information Risk: Balancing the Good and Bad of Data Analytics

CEB IT

Instead of simply conducting due diligence on the immediate vendor, information risk teams should look beyond into as much of the rest of the supply chain as necessary (see chart 1).

Information Risk: Three Lessons for CISOs from Yahoo’s Rough Six Months

CEB IT

But for now, chief information security officers (CISOs) should take three core lessons on board. CISOs also play a critical role in helping the senior M&A team understand how information risks associated with M&A can manifest as business risks with poor financial outcomes.

Top 10 information management stories of 2016

Computer Weekly

The use of big data technology has been a strong theme. Data visualisation and graph database technology came together in the Panama Papers, while Leicester City won the Premier League with data analytics

CAMBRIC: The Seven Megatrends Creating The Future Of Information Technology

CTOvision

CTOvision has just released our latest white paper projecting the future of seven major trends in information technology. Download “CAMBRIC: The Seven Megatrends Creating The Future Of Information Technology” 151010a-The-Future-Of-IT.pdf – Downloaded 51 times – 1 MB. You can remember these seven major IT megatrends by the mnemonic acronym Cambric. Cambric stands for: C loud Computing. A rtificial Intelligence. M obility. B ig Data. R obotics.

Lessons from the Synergy Forum: Cybersecurity through Information Sharing

CTOvision

When an individual contracts an infectious disease, hospitals share that information openly, so other hospitals and the government can better prepare in the case of an outbreak. Members of the network could have better information about what to look for and when to expect the next threat.

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Conference Events will include 6 Invited speakers & government panel, 25 Academic presentations, 6 industry presentations, plus the Oak Ridge Cyber & Information Security Research Group. By Charles Hall.

Information security set for steep trajectory, says (ISC)2

Computer Weekly

By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession

Better Cyber Security Through Cyber Intelligence: Information Session Oct. 28

CTOvision

Friends at the highly regarded Carnegie Mellon University Software Engineering Institute (SEI) provided us the information below with a request that we get it into your hands. Better Cyber Security Through Cyber Intelligence: Information Session Oct. Bob Gourley. Please consider engaging with CMU SEI on this important topic, either in person or by getting others from your organization to attend.

How to Keep Your Company’s Information Organized

CTOvision

The larger that your company grows, the more vital that it is for all the information your company processes to be properly organized at all times. Information organization quality is directly correlated with just how actionable the information is. Accurate information organization puts your company in the best position to develop fully customized white label […].

Putting a value on your company information

CTOvision

In this age of digital transformation, it is obvious that the information assets of an organization are increasing, but putting a value on something so seemingly intangible isn’t easy – especially as information is fluid and doesn’t behave like other assets. The way we view information has changed forever. Many enterprises believe that the data and information they hold on customers and prospects is key to the success of the business. John Mancini.

Brexit: Information security professionals not too concerned

Computer Weekly

Brexit will present some cyber security challenges – but it will be largely business as usual, say information security professionals

Information Security Budgets: More Money and More Staff, But Growth Finally Slowing

CEB IT

Information security functions have become far more important to their companies in the past decade, and that’s reflected in how the resources they’re allocated has grown and grown. Blog Budgeting and Planning Information Risk Information Technology Manage Your People

Ushering in the Next Generation Information Architecture

CIO Dashboard

Capturing all available, relevant information and transitioning it into insights to drive business value continues to be a major challenge—even for companies that consider data and analytics as the lifeblood of their growth agendas. The Customer Information Officer.

Cloud Computing + Things = ‘Information Excellence,’ Not IoT

Cloud Musings

The Internet of Things (IoT) has quickly become the next “be all to end all” in information technology. Despite these current challenges, the blending of Things and cloud computing can deliver real value today in the creation of “Information Excellence”.

Dell 47

Big Data Unlocks Valuable Information Across Organizations—But Only If You Can Protect It

CTOvision

They collect vast amounts of information, and use data science to discover new customers needs, develop new products and services, and identify trends and opportunities. Usage data from Internet of Things sensors, which could be used to inform product development. Clinical data that could inform hospital staffing levels and disease research. In all of these cases, and many others, forward-looking CTOs are seeking to break down barriers between information stores.

NIST Issues Draft Guide To Cyber Threat Information Sharing

CTOvision

The document is SP 800-150, the Guide to Cyber Threat Information Sharing. I am going to suggest a tiny bit more information on some key technical standards for information sharing. Overall I found this to be a fantastic document that I believe can make a positive contribution to enterprise threat information sharing right now. I love and respect NIST and I just want to come right out with that so you know where I am coming from.