How and When to Quantify Information Risk

CEB IT

Most people think of risk quantification as the practice of assigning a dollar value to information risk, but even ranking different types of risk into an ordinal scale (first, second, third, etc) involve a degree of quantification.

The 6 Reasons Employees are Lax about Information Security

CEB IT

Information security teams can spend all the money in their budget on fancy technology but it’s for naught if employees don’t use it. Blog Collaborate Across the Organization Information and Data Risk Management Information Risk Information Technology

Trending Sources

10 New Information Security Roles for the Digitization Era

CEB IT

High demand and a limited pool of people with the right skills and experience make information security staffing a perennial challenge. Further complicating things is the fact that information security teams have not yet adapted to their changing role in digitizing companies.

Seamless Sharing of Information Amongst Enclaves

CTOvision

An information-sharing enclave is a group of users, organizations, or systems who need to share information, along with the rules and protocols used to make this sharing possible. One example of an information-sharing enclave is a Navy Carrier Strike Group, or CSG.

3 Ways to Protect Firms’ Information Security as they Digitize

CEB IT

The way companies create, sell, and market products, and run the operations to do so, is increasingly based on the use of technology and digital information (see chart 1), and this trend of digitization will only continue more quickly across the next five years.

The Universe of The Chief Information Officer

A CIO's Voice

Filed under: C-Level Executives , CIO , CIO/CTO , IT Process , Management Tagged: Alignment , CEO , CFO , Chief Information Officer , CIO , CIO Leader , CMO , COO , corporate innovation , culture , executive , leader , Management.

66

Information Risk: How to Manage the Company’s Demand for Your Services

CEB IT

Information security teams face an unprecedented level of demand for their services right now. The strain on the time and resources of information security teams is understandable ( as Yahoo can attest ), and even though their companies are stumping up money, information security budget growth is slowing. Automating operations and governance activities offers the best chance to meet information security demands.

Agile 39

PowerShell: Pulling information from MSP files

Mick's IT Blog

The key information that helped me what from Microsoft's Installer.OpenDatabase method webpage. The script below was written for obtaining information from an MSP pertaining to Microsoft Office updates. Recently, I began making significant updates to one of my other scripts on here.

Adobe 63

Inform your federal growth strategy with Opptiv

CTOvision

This is a Cognitio sponsored post, Contact Us for information on sponsoring your content. . By Bob Gourley. Opptiv is a sponsor of Cognitio''s 30 April 2015 Synergy Forum.

Information Risk: Three Lessons for CISOs from Yahoo’s Rough Six Months

CEB IT

But for now, chief information security officers (CISOs) should take three core lessons on board. CISOs also play a critical role in helping the senior M&A team understand how information risks associated with M&A can manifest as business risks with poor financial outcomes.

IT Infrastructure: 3 Steps to Respond to Today’s Information Security Concerns

CEB IT

Don’t (just) focus on new technology : Infrastructure organizations continue to increase their spending on information security solutions as their primary strategy for improving security.

CAMBRIC: The Seven Megatrends Creating The Future Of Information Technology

CTOvision

CTOvision has just released our latest white paper projecting the future of seven major trends in information technology. Download “CAMBRIC: The Seven Megatrends Creating The Future Of Information Technology” 151010a-The-Future-Of-IT.pdf – Downloaded 51 times – 1 MB. You can remember these seven major IT megatrends by the mnemonic acronym Cambric. Cambric stands for: C loud Computing. A rtificial Intelligence. M obility. B ig Data. R obotics.

Lessons from the Synergy Forum: Cybersecurity through Information Sharing

CTOvision

When an individual contracts an infectious disease, hospitals share that information openly, so other hospitals and the government can better prepare in the case of an outbreak. Members of the network could have better information about what to look for and when to expect the next threat.

Better Cyber Security Through Cyber Intelligence: Information Session Oct. 28

CTOvision

Friends at the highly regarded Carnegie Mellon University Software Engineering Institute (SEI) provided us the information below with a request that we get it into your hands. Better Cyber Security Through Cyber Intelligence: Information Session Oct. Bob Gourley. Please consider engaging with CMU SEI on this important topic, either in person or by getting others from your organization to attend.

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Conference Events will include 6 Invited speakers & government panel, 25 Academic presentations, 6 industry presentations, plus the Oak Ridge Cyber & Information Security Research Group. By Charles Hall.

Information Security Budgets: More Money and More Staff, But Growth Finally Slowing

CEB IT

Information security functions have become far more important to their companies in the past decade, and that’s reflected in how the resources they’re allocated has grown and grown. Blog Budgeting and Planning Information Risk Information Technology Manage Your People

Putting a value on your company information

CTOvision

In this age of digital transformation, it is obvious that the information assets of an organization are increasing, but putting a value on something so seemingly intangible isn’t easy – especially as information is fluid and doesn’t behave like other assets. The way we view information has changed forever. Many enterprises believe that the data and information they hold on customers and prospects is key to the success of the business. John Mancini.

Creating a Culture of Information Security

Data Center Knowledge

Organizations need to start thinking about information security as an element that enables businesses, facilitating increased competitive advantage that allows them to manage risk and protect all of the dollars that have been spent on creating a brand.

Information Risk: How APIs are Making Security Governance Easier

CEB IT

But now information risk teams are automating security governance by providing security capabilities via micro services and APIs. Information security teams like using microservices and APIs because of their simplicity and ease of use. Blog Information Risk Information Technology

Cloud Computing + Things = ‘Information Excellence,’ Not IoT

Cloud Musings

The Internet of Things (IoT) has quickly become the next “be all to end all” in information technology. Despite these current challenges, the blending of Things and cloud computing can deliver real value today in the creation of “Information Excellence”.

Dell 52

Ushering in the Next Generation Information Architecture

CIO Dashboard

Capturing all available, relevant information and transitioning it into insights to drive business value continues to be a major challenge—even for companies that consider data and analytics as the lifeblood of their growth agendas. The Customer Information Officer.

Big Data Unlocks Valuable Information Across Organizations—But Only If You Can Protect It

CTOvision

They collect vast amounts of information, and use data science to discover new customers needs, develop new products and services, and identify trends and opportunities. Usage data from Internet of Things sensors, which could be used to inform product development. Clinical data that could inform hospital staffing levels and disease research. In all of these cases, and many others, forward-looking CTOs are seeking to break down barriers between information stores.

9 biggest information security threats through 2019

Network World

The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the Information Security Forum (ISF) — a nonprofit association that researches and analyzes security and risk management issues on behalf of its members — puts out its Threat Horizon report to provide members with a forward-looking view of the biggest security threats over a two-year period.

NIST Issues Draft Guide To Cyber Threat Information Sharing

CTOvision

The document is SP 800-150, the Guide to Cyber Threat Information Sharing. I am going to suggest a tiny bit more information on some key technical standards for information sharing. Overall I found this to be a fantastic document that I believe can make a positive contribution to enterprise threat information sharing right now. I love and respect NIST and I just want to come right out with that so you know where I am coming from.

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security.

2015 National Chief Information Security Officer Survey

Cloud Musings

Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chief Information Security Officer (CISO).

Why Measure the Value of an Organization’s Information?

CTOvision

Information value. CTOvision.com recently posted an interesting article by John Mancini titled Putting a value on your company information. In it Mancini says, it is imperative that standard models to measure information are introduced as a matter of urgency in this digital age. But two major hurdles stand in the way: how to measure the value of information you don’t control and understanding that it can only realistically be measured in the context in which it is being used.

Drowning in Data, Starved for Information

Eric D. Brown

In his 1982 book Megatrends, John Naisbitt wrote “We are drowning in information but starved for knowledge.” Today, we are drowning in data and starved for information. Data is useless unless you can convert it to information and ultimately into knowledge.

How information security professionals can help business understand cyber risk

Computer Weekly

Information security is continually moving up business and board agendas, but information security professionals find it challenging to help business leaders to understand fully the cyber risks across increasingly digital businesses

Want The Government To Do Something About Cybersecurity? Advocate Congress establish a permanent joint committee on information technology

CTOvision

The United States Congress Permanent Joint Committee on Information Technology does not exist, yet. We are in need of such dramatic progress in how the nation leverages Information Technology that a similar approach may be required today. The panel coupled these legislative powers with exclusive access to the information upon which its highly secretive deliberations were based. or just the optimized benefits of the information age. Bob Gourley.

How to Keep Your Information Online Private and Secure

Galido

In today’s technologically advanced world, it is more important than ever to keep your information safe and secure. Follow these easy tips to secure all of your accounts and keep would-be information thieves at bay. Related: How to remove personal information from internet.

Visualizing Information Most Important with Job-Based Metrics

CTOvision

The information provided above is brought to you by Bright Computing. Katie Kennedy. Most HPC users care more about health and resources usage of a specific job than the device they run on. That is why Bright added job-based metrics to their Bright Cluster Manager solutions.

IDG Contributor Network: To improve information security, enterprises and government must share information

Network World

Information security is forever weaved into our daily lives. From the massive data breaches impacting Target, Yahoo and Anthem to IoT-powered DDoS attacks that take down substantial portions of the internet for extended periods of time, information security impacts everyone.