Risk Management / News

Are you winning?

I am constantly astounded at the number of people who cannot answer this question or can only answer it with generalities or anecdotes. They have no or very little objective data, writes Owen McCall.

Written by Owen McCall18 Nov. 13 07:36

CIOs Want to Be Allies, Not Adversaries, With Business Users

For years, CIOs raged against stealth technology that could put their company's security - and maybe their authority - at risk. Today, though, IT executives see the world differently and are quick to explain that they should be ambassadors between tech vendors and business users.

Written by Tom Kaneshige21 Oct. 13 22:47

Insider threats and how they can be mitigated

Any employee with access to sensitive data is a potential threat, whether they know it or not. Even if they don't have malicious intentions, the inherent nature of their privilege is what makes them so dangerous.

Written by Grant Hatchimonji15 Oct. 13 14:47

A five-pillar survival guide for an insecure cyber world

Here are five pillars to consider in rethinking your approach to data security in a cyber-environment in which both values and risks increase daily.

Written by Bob Brammer, Chief Strategy Officer, Brainloop11 Oct. 13 22:05

How to build the immortal data center

If your data center is reaching capacity and you're thinking about cracking open the corporate piggy bank to fund a new data center, stop right there.

Written by Neal Weinberg10 Oct. 13 14:56

Once a target, always a target: A second look at awareness training in action

The one constant about user awareness training is that the awareness part is supposed to stick with you. Learning how to spot one type of phishing email is only good for that particular email, thus the concept of awareness is learning to trust your gut when something looks suspicious.

Written by Steve Ragan09 Oct. 13 19:55

10 steps to ensure your IT outsourcing deal fails

The successful relationships share the same best practices while the failed arrangements are uniquely flawed. But, in fact, the most disappointing deals do share common characteristics.

Written by Stephanie Overby30 Sept. 13 05:38

Phishing attack starts with a 'cold call'

NetSafe warns New Zealand businesses to take preventative measures against sophisticated phishing after the local branch of an international retailer became the target of such attacks.

Written by Divina Paredes27 Sept. 13 09:42

The America's Cup: nerves, skill and a lot of computers

This year's America's Cup will be remembered for Oracle Team USA's jaw-dropping comeback against Emirates New Zealand, but it should also be remembered for the huge role computers have come to play in the competition.

Written by James Niccolai26 Sept. 13 18:59

‘Today’s incidents, yesterday’s strategies’

The war on information security is worsening: organisations are now defending yesterday, while their adversaries are exploiting the threats of tomorrow, according to The Global State of Information Security Survey 2014, conducted by PwC and CIO and CSO magazines.

Written by CIO New Zealand20 Sept. 13 09:54

The department of transformers

The game has changed and IT has a pivotal role to play in enabling business transformation.

Written by Ulrika Hedquist25 Aug. 13 08:36

The CIO’s first order of business

Before you can be influential you need to be seen as fundamentally competent, writes Owen McCall. You have to be strategically relevant, that is, you have to understand your business and the issues your peers are dealing with on a daily basis. You have to be influential with your peers so that when you talk knowledgeably about how IT can deliver value to the business or how IT was altering the competitive landscape, they listen.

Written by Owen McCall21 Aug. 13 06:10

How to present security issues to a board

By 2014, 80 per cent of IT security executives will be required to report risk issues to their board of directors but many presentations need improvement, according to a Gartner security analyst.

Written by Hamish Barwick19 Aug. 13 11:34

Will CSOs become CROs in the future?

Few would deny the chief security officer role has evolved quite a bit in recent years. At many large companies, the heads of both physical and information security now report in to the same person, an enterprise CSO. The pace of change for the function is accelerating along with the ever-changing nature of threats.

Written by Lauren Gibbons Paul23 July 13 15:12

The day after the earthquake

It was a Sunday afternoon but Channa Jayasinha was in the Wellington City Council (WCC) complex when the earthquake struck.

Written by Divina Paredes22 July 13 16:19

Spy-proof enterprise encryption is possible, but daunting

Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data encryption technologies is not an easy task, according to security experts.

Written by Lucian Constantin13 June 13 21:18

Enterprise risk management: Get started in six steps

Let's say your organization doesn't have a formal enterprise risk management program. If you're at a big company, ERM might seem daunting because of silos, inertia and so on.

Written by Derek Slater09 Sept. 10 13:12