How and When to Quantify Information Risk

CEB IT

Most people think of risk quantification as the practice of assigning a dollar value to information risk, but even ranking different types of risk into an ordinal scale (first, second, third, etc) involve a degree of quantification.

10 New Information Security Roles for the Digitization Era

CEB IT

High demand and a limited pool of people with the right skills and experience make information security staffing a perennial challenge. Further complicating things is the fact that information security teams have not yet adapted to their changing role in digitizing companies.

Trending Sources

The 6 Reasons Employees are Lax about Information Security

CEB IT

Information security teams can spend all the money in their budget on fancy technology but it’s for naught if employees don’t use it. Blog Collaborate Across the Organization Information and Data Risk Management Information Risk Information Technology

Seamless Sharing of Information Amongst Enclaves

CTOvision

An information-sharing enclave is a group of users, organizations, or systems who need to share information, along with the rules and protocols used to make this sharing possible. One example of an information-sharing enclave is a Navy Carrier Strike Group, or CSG.

Information Security: The 8 Types of Risk Assessment You Should Know About

CEB IT

Chart 1 below can help with understanding the different types of risk assessment that information security teams need to conduct, and may also help explain the process, and the importance of it, to colleagues.

IT Infrastructure: 3 Steps to Respond to Today’s Information Security Concerns

CEB IT

Don’t (just) focus on new technology : Infrastructure organizations continue to increase their spending on information security solutions as their primary strategy for improving security.

Information Security: What You Should Know About Agile, DevOps, and Continuous Delivery

CEB IT

10 Ways Digitalization is Upending Information Security. A recent survey of around two dozen heads of information security produced a useful overview of the nature of this problem and how some of the world’s most forward-thinking teams are responding.

The Universe of The Chief Information Officer

A CIO's Voice

Filed under: C-Level Executives , CIO , CIO/CTO , IT Process , Management Tagged: Alignment , CEO , CFO , Chief Information Officer , CIO , CIO Leader , CMO , COO , corporate innovation , culture , executive , leader , Management.

66

Information Risk: 3 Threat Management Trends to Keep an Eye On

CEB IT

Although the threat management tools and techniques available to chief information security officers (CISOs) have also improved, this still leaves much to do. However, by the time information security teams respond, attackers have most likely already caused a lot of damage.

Tools 33

Information Risk: How to Manage the Company’s Demand for Your Services

CEB IT

Information security teams face an unprecedented level of demand for their services right now. The strain on the time and resources of information security teams is understandable ( as Yahoo can attest ), and even though their companies are stumping up money, information security budget growth is slowing. Automating operations and governance activities offers the best chance to meet information security demands.

Agile 40

PowerShell: Pulling information from MSP files

Mick's IT Blog

The key information that helped me what from Microsoft's Installer.OpenDatabase method webpage. The script below was written for obtaining information from an MSP pertaining to Microsoft Office updates. Recently, I began making significant updates to one of my other scripts on here.

Adobe 63

Inform your federal growth strategy with Opptiv

CTOvision

This is a Cognitio sponsored post, Contact Us for information on sponsoring your content. . By Bob Gourley. Opptiv is a sponsor of Cognitio''s 30 April 2015 Synergy Forum.

Information Risk: Three Lessons for CISOs from Yahoo’s Rough Six Months

CEB IT

But for now, chief information security officers (CISOs) should take three core lessons on board. CISOs also play a critical role in helping the senior M&A team understand how information risks associated with M&A can manifest as business risks with poor financial outcomes.

CAMBRIC: The Seven Megatrends Creating The Future Of Information Technology

CTOvision

CTOvision has just released our latest white paper projecting the future of seven major trends in information technology. Download “CAMBRIC: The Seven Megatrends Creating The Future Of Information Technology” 151010a-The-Future-Of-IT.pdf – Downloaded 51 times – 1 MB. You can remember these seven major IT megatrends by the mnemonic acronym Cambric. Cambric stands for: C loud Computing. A rtificial Intelligence. M obility. B ig Data. R obotics.

Lessons from the Synergy Forum: Cybersecurity through Information Sharing

CTOvision

When an individual contracts an infectious disease, hospitals share that information openly, so other hospitals and the government can better prepare in the case of an outbreak. Members of the network could have better information about what to look for and when to expect the next threat.

Better Cyber Security Through Cyber Intelligence: Information Session Oct. 28

CTOvision

Friends at the highly regarded Carnegie Mellon University Software Engineering Institute (SEI) provided us the information below with a request that we get it into your hands. Better Cyber Security Through Cyber Intelligence: Information Session Oct. Bob Gourley. Please consider engaging with CMU SEI on this important topic, either in person or by getting others from your organization to attend.

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Conference Events will include 6 Invited speakers & government panel, 25 Academic presentations, 6 industry presentations, plus the Oak Ridge Cyber & Information Security Research Group. By Charles Hall.

Information Security Budgets: More Money and More Staff, But Growth Finally Slowing

CEB IT

Information security functions have become far more important to their companies in the past decade, and that’s reflected in how the resources they’re allocated has grown and grown. Blog Budgeting and Planning Information Risk Information Technology Manage Your People

Putting a value on your company information

CTOvision

In this age of digital transformation, it is obvious that the information assets of an organization are increasing, but putting a value on something so seemingly intangible isn’t easy – especially as information is fluid and doesn’t behave like other assets. The way we view information has changed forever. Many enterprises believe that the data and information they hold on customers and prospects is key to the success of the business. John Mancini.

Creating a Culture of Information Security

Data Center Knowledge

Organizations need to start thinking about information security as an element that enables businesses, facilitating increased competitive advantage that allows them to manage risk and protect all of the dollars that have been spent on creating a brand.

Cloud Computing + Things = ‘Information Excellence,’ Not IoT

Cloud Musings

The Internet of Things (IoT) has quickly become the next “be all to end all” in information technology. Despite these current challenges, the blending of Things and cloud computing can deliver real value today in the creation of “Information Excellence”.

Dell 52

Ushering in the Next Generation Information Architecture

CIO Dashboard

Capturing all available, relevant information and transitioning it into insights to drive business value continues to be a major challenge—even for companies that consider data and analytics as the lifeblood of their growth agendas. The Customer Information Officer.

Information Risk: How APIs are Making Security Governance Easier

CEB IT

But now information risk teams are automating security governance by providing security capabilities via micro services and APIs. Information security teams like using microservices and APIs because of their simplicity and ease of use. Blog Information Risk Information Technology

Big Data Unlocks Valuable Information Across Organizations—But Only If You Can Protect It

CTOvision

They collect vast amounts of information, and use data science to discover new customers needs, develop new products and services, and identify trends and opportunities. Usage data from Internet of Things sensors, which could be used to inform product development. Clinical data that could inform hospital staffing levels and disease research. In all of these cases, and many others, forward-looking CTOs are seeking to break down barriers between information stores.

NIST Issues Draft Guide To Cyber Threat Information Sharing

CTOvision

The document is SP 800-150, the Guide to Cyber Threat Information Sharing. I am going to suggest a tiny bit more information on some key technical standards for information sharing. Overall I found this to be a fantastic document that I believe can make a positive contribution to enterprise threat information sharing right now. I love and respect NIST and I just want to come right out with that so you know where I am coming from.

2015 National Chief Information Security Officer Survey

Cloud Musings

Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chief Information Security Officer (CISO).

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security.

9 biggest information security threats through 2019

Network World

The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the Information Security Forum (ISF) — a nonprofit association that researches and analyzes security and risk management issues on behalf of its members — puts out its Threat Horizon report to provide members with a forward-looking view of the biggest security threats over a two-year period.

Drowning in Data, Starved for Information

Eric D. Brown

In his 1982 book Megatrends, John Naisbitt wrote “We are drowning in information but starved for knowledge.” Today, we are drowning in data and starved for information. Data is useless unless you can convert it to information and ultimately into knowledge.

Why Measure the Value of an Organization’s Information?

CTOvision

Information value. CTOvision.com recently posted an interesting article by John Mancini titled Putting a value on your company information. In it Mancini says, it is imperative that standard models to measure information are introduced as a matter of urgency in this digital age. But two major hurdles stand in the way: how to measure the value of information you don’t control and understanding that it can only realistically be measured in the context in which it is being used.

How information security professionals can help business understand cyber risk

Computer Weekly

Information security is continually moving up business and board agendas, but information security professionals find it challenging to help business leaders to understand fully the cyber risks across increasingly digital businesses

Want The Government To Do Something About Cybersecurity? Advocate Congress establish a permanent joint committee on information technology

CTOvision

The United States Congress Permanent Joint Committee on Information Technology does not exist, yet. We are in need of such dramatic progress in how the nation leverages Information Technology that a similar approach may be required today. The panel coupled these legislative powers with exclusive access to the information upon which its highly secretive deliberations were based. or just the optimized benefits of the information age. Bob Gourley.

How to Keep Your Information Online Private and Secure

Galido

In today’s technologically advanced world, it is more important than ever to keep your information safe and secure. Follow these easy tips to secure all of your accounts and keep would-be information thieves at bay. Related: How to remove personal information from internet.