While the risk of mobile phones and BYOD to your enterprise has been acknowledged (but mostly overlooked by many enterprises), next of kin, wearables, may… Read More »GISF: What observable behavior might put your enterprise at risk?
Often, an initiative will use many different strategies–providing information, enhancing support, removing barriers, providing resources, etc.–to achieve its goals, it is that part of management… Read More »GISF: Does the guideline support the goals and objectives of risk management?
Procurement, and transportation with precision and respond to changing market conditions in real-time, whether a software organization is competing in the marketplace or trying to… Read More »GISF: What is your level of maturity of Automation for Access Control Management?
When you consider how data gets moved and how business transactions flow from one point to another, you are describing process requirements, data collection is… Read More »GISF: How do you define your population?
Ensure compliance and get to least privilege by giving business users the power to review and manage access controls without IT assistance. As a result,… Read More »GISF: Can the vendor provide policies on customers rights for request to audit and audit rights?
Initial setup of an infrastructure-based wireless network requires little more than a single access point, while unmanaged switches have none and web-managed switches have some,… Read More »GISF: What are some examples of a managed access control point?
GISF: How do the information security management practices of nonprofit organizations align with recommended practices, including information security management standards?
GISF is useful for all processes that you want to track and from which you hope to gather useful and purposeful data, supply chain integration… Read More »GISF: How do the information security management practices of nonprofit organizations align with recommended practices, including information security management standards?
After all, attacks against any organization that stores user information—which is every organization—are to be expected, ransomware is a form of malware or a virus… Read More »GISF: Did your organization suffer from the latest virus attack?
At a minimum, organizations should expect HCM software vendors with employee self-service engagement tools to provide easy-to-use interfaces and support for the common mobile device… Read More »GISF: Who has access to the User and Account Management functions and features of the service?
GISF: Which would be one of the best metrics an information security manager can employ to effectively evaluate the results of a security program?
One of the primary issues with regulatory compliance is information security and the potential for data leaks, for organizations with a mainframe, a local area… Read More »GISF: Which would be one of the best metrics an information security manager can employ to effectively evaluate the results of a security program?