Application and systems development processes may result in poor design or implementation, improved customer service can be realized through customizable web interfaces that are set… Read More »GISF: How could improvements in information security management be achieved?
GISF: Do you have adequate oversight of vendors with respect to resiliency and recovery capabilities?
Historically, the insurance industry has been slow to respond to emerging risk issues, and things have caught up on cyber liability in a huge way,… Read More »GISF: Do you have adequate oversight of vendors with respect to resiliency and recovery capabilities?
Simply formatting your hard disk to erase data before disposing of the machine is insufficient – a savvy crook can still recover it, data theft… Read More »GISF: Where can personal data be found?
GISF: Does your information security policy have the authority it needs to manage and ensure compliance with the information security policy?
You use the information for security purposes, to facilitate navigation, to display information more effectively, to personalize, tailor your experience while engaging with you, and… Read More »GISF: Does your information security policy have the authority it needs to manage and ensure compliance with the information security policy?
Establishing an ethical environment at all levels of your organization is the most important element of accountability and control. In addition, the purchase order officially… Read More »GISF: Is a payment system in place with proper reviews and approvals?
Identifying and reducing risks, and responding to any information security incident, is a top priority that pulls resources from all areas together, you may want… Read More »GISF: How many internet-facing hosts do you want the information security office to assess?
The ambition for organizations is to provide each of customers online secure login, data access control and the best user experience without compromising security, sales… Read More »GISF: Who is responsible for access control?
By taking a holistic, platform approach to technology risk management, security teams reduce the number of point products, reallocate budget and scarce resources and justify… Read More »GISF: How do you justify the information security budget requirements to the board?