risk
Closing the Confidence Gap
In a world of scrolling through social media posts on our mobile devices, “thumb-stopping moments” are those that make you click with a purpose. That was what an article from the Atlantic was for me three years ago, “The Confidence Gap” made me slow my scroll. At the time, I was in the m…
GDPR: Start Your Privacy Protection Planning Now
One of the most talked about topics at the June Infosecurity Europe 2017 conference in London was the General Data Protection Regulation (GDPR). This is a new law concerning data privacy which will render the implications of a data breach much more severe and comes into force in all EU countries fro…
Control Your Own Security
Digitization continues to change business at an amazing rate and in many ways. As business leaders around the world embrace ‘Digital’ to simplify, automate, and deliver innovation, they’re no longer simply using Information Technology to run their businesses; IT is enabling it. IT is the vital lifeb…
Laying the Groundwork for Organizational Change
An Innovation Funding Board (IFB) can play an effective role in reducing innovation-related struggles. In my second blog on this topic, I share key principles and questions to consider before putting an IFB in place. But first, it’s important to establish a little more clearly what an IFB is and whe…
Don’t Risk IT: Cybersecurity Risk Driving IT Modernization
Many federal, state, and local government agencies are operating old, outdated and end-of-life network equipment. You may think this just means slower, less efficient operation – not worth the cost to refresh your infrastructure, right? Wrong. Outdated network equipment is actually a major cyb…
The Evolution of Scoring Security Vulnerabilities
The Common Vulnerability Scoring System (CVSS), which is used by many in the industry as a standard way to assess and score security vulnerabilities, is evolving to a new version known as CVSSv3. These changes addressed some of the challenges that existed in CVSSv2; CVSSv3 analyzes the scope of a vu…
Cisco Security Workshop at OilComm 2015
Get the edge and agility to innovate, compete, and win with Cisco’s digital solutions for oil and gas. Connect machines, assets, and people across your business with proven architectures and technologies. Secure it all from board room to field worker to remote, unmanned site. Ever wondered about how…
Cisco 2014 Midyear Security Report: Security Services and Risk Management
More organizations are starting to view cybersecurity as a strategic risk. They have to—it’s becoming unavoidable. Technology and the business are so intertwined. Regulators are issuing more compliance measures that include information security directives. And all the while, adversaries are re…
Cyber Threat Management from the Boardroom Risk: Lost in Translation
I was at the Gartner Security and Risk Management Summit at the Gaylord National Harbor and had the opportunity to attend the session, “Finding the Sweet Spot to Balance Cyber Risk,” which Tammie Leith was facilitating. During the session, the panel had been discussing how the senior le…
5