Blog Posts Tagged with "Security Strategy"


Centering Your Security Strategy on Leadership, Resilience and Fundamentals

March 16, 2018 Added by:Steve Durbin

Companies that prioritize well-equipped security programs and widespread security awareness are more prepared to grow, innovate and compete.

Comments  (0)


IT Risk Management: Roadmap for a Roadmap

July 03, 2012 Added by:Jared Pfost

Most IT organizations aren't equipped or supported to build a mature program. If our objective is to deliver an evidence driven investment road map aligned with the business, it's OK to plan a phased approach and demonstrate value while the culture, process, and necessary resources gain momentum...

Comments  (0)


Feds Release Digital Government Strategy

June 22, 2012 Added by:Headlines

The Federal government released The Digital Government Strategy, a 12-month action plan for the deployment of new technology is designed to enable the delivery of digital information and services anytime, anywhere, on any device, safely and securely-throughout the Federal workforce and to the American public...

Comments  (0)


Napoleon’s Invasion of Russia and Risk Management

June 20, 2012 Added by:Thomas Fox

As compliance programs become more mature, you can use the information generated in a risk assessment in a variety of ways to facilitate an overall risk management program. To create an effective risk management system, understand the qualitative distinctions among types of risk an organization faces...

Comments  (0)


The Next War on Terror Will Be (Lost) Online

May 31, 2012 Added by:Ali-Reza Anghaie

Consider we might be putting our cyber soldiers on the wrong line. Sure, there are growing ranks of cyber counter-terrorism practitioners across both private and public space, except that's only to meet the enemy we really want to see - the one that suits perhaps what we're comfortable doing or getting funding for...

Comments  (0)


Logging: Opening Pandora's Box - Part 4 - Awareness

May 20, 2012 Added by:Rafal Los

Awareness is the ability to know, understand and react to various types of events in near-real-time in order to defend your enterprise. Whether you're defending it from performance failures, functionality failures, or security failures is dependent on the group you work in...

Comments  (0)


Iranian Bank Accounts Hacked: A Cyber Warfare Hypothesis

April 17, 2012 Added by:Pierluigi Paganini

Banking is a vital component of a country, it is considered in every cyber strategy as critical infrastructure. If a country is attacked so that its financial institutions fail it would produce an environment for other cyber and military operations, a typical cyberwar scenario...

Comments  (0)


Defense Department to Accelerate Cyber Weapons Development

April 10, 2012 Added by:Headlines

“Cyberweapons are fundamentally different... You can make a general-purpose fighter plane and it will function more or less the same in the Pacific as in the Atlantic. The same is not true for going after a Russian cyber-target versus a Chinese target..."

Comments  (0)


Positioning the Security Team Through Influence Part 1

April 06, 2012 Added by:Steven Fox, CISSP, QSA

The essential approach to enhancing the role of security professionals is to enhance their organizational influence. This article kicks off a series exploring basic influence styles, the associated pitfalls, and guidance for their proper application...

Comments  (0)


Fifteen Unsafe Security Practices that Lead to Data Breaches

March 21, 2012 Added by:Kelly Colgan

Database security is an essential element of overall security maturity at enterprise level. Underestimating its value and not dedicating sufficient attention to developing a comprehensive data security plan can, in many instances, lead to data compromise...

Comments  (1)


A Structured Approach to Handling External Connections

February 27, 2012 Added by:Enno Rey

The approach to be developed is meant to work on the basis of several types of remote connections in which each determines associated security controls and other parameters. At the first glance, not overly complicated, but – as always – the devil is in the details...

Comments  (0)


China’s Cyber Strategy – Too Much or Too Little?

January 10, 2012 Added by:Joel Harding

That the Chinese government seems to be systematically penetrating corporate and government system in order to steal corporate and government secrets is not really the issue. This appears to be an accepted fact, and the issue is how to address the problem...

Comments  (0)


Government Cyber Strategy Directs Billions for R and D

December 19, 2011 Added by:Headlines

"When we look at the plan itself, it represents our visions for the research necessary to develop game changing technologies that can help neutralize today's cyber attacks and build an infrastructure to secure our systems from what may come in the future..."

Comments  (0)


DHS Releases Blueprint for a Secure Cyber Future

December 13, 2011 Added by:Headlines

The document is meant to provide a road map for cybersecurity efforts while observing the the need to preserve civil liberties, protect privacy, bolster national security, and provide the ability for the private sector to effectively operate and innovate in cyberspace...

Comments  (0)


Federal Cyber Security R and D Strategy Released

December 07, 2011 Added by:Headlines

"Sustained efforts in these areas will result in a more secure and trustworthy cyberspace. We invite researchers and innovators in industry and academia to join us in this effort. Together, we can maximize the benefits of research and accelerate their transition into the marketplace..."

Comments  (0)


UK Security Strategy

November 02, 2011 Added by:Mark Gardner

I know things change at a rapid pace in It and Security but, as a Security Professional and a UK taxpayer, why the constant writing of strategies. Surely the best defense for the UK is to actually not give the details of what the government is proposing to do?

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »
Most Liked