The chief benefits listed by organizations that have successfully moved to the cloud include increased efficiency, ease of access, simpler administration and management, and overall… Read More »GISF: Does your organization or service provider have insurance coverage?
GISF: Do you have adequate oversight of vendors with respect to resiliency and recovery capabilities?
Historically, the insurance industry has been slow to respond to emerging risk issues, and things have caught up on cyber liability in a huge way,… Read More »GISF: Do you have adequate oversight of vendors with respect to resiliency and recovery capabilities?
GISF: Does your organization monitor, evaluate, and adjust the information security program, as needed?
Effective managers and team leaders actively monitor employees in a variety of ways to ensure that low performers are quickly disciplined and high performers are… Read More »GISF: Does your organization monitor, evaluate, and adjust the information security program, as needed?
Participative (or participatory) management, otherwise known as employee involvement or participative decision making, encourages the involvement of stakeholders at all levels of your organization in… Read More »GISF: How do other organizations go about shifting the ownership of business information?
GISF: What are the possible ways to make information security benefits more visible in your organization?
Security and risk leaders should also aim to drive change by establishing and contributing to industry dialogue and doing proofs-of-concept on new security technologies, theft,… Read More »GISF: What are the possible ways to make information security benefits more visible in your organization?
Akin are, through a complex chain of operations, converted into machine language, the old code can be reapplied by forcing the machine to perform a… Read More »GISF: What if there was a bug in code that rendered the machine inoperable?
Therefore, it is important that your organization IT operations focus on advancing and improving business requirements while maintaining the operational stability of your organization, enterprise… Read More »GISF: How do you ensure alignment between Business, IT and Information Security?
Pay for on-call time is given when employees are paid for the time spent being available to work, the information collected might relate to you,… Read More »GISF: How much is spent on information security and what is it being spent on?
GISF: Do security policy and procedures clearly define information security responsibilities for all personnel?
Broad overview role to ensure the procedures support the strategic direction the board is setting, and that all policies, reengineering a system to incorporate security… Read More »GISF: Do security policy and procedures clearly define information security responsibilities for all personnel?
Simply formatting your hard disk to erase data before disposing of the machine is insufficient – a savvy crook can still recover it, data theft… Read More »GISF: Where can personal data be found?