Content Vault : Security | Recommended Content
Business Issues, Security

Technology risk assessment #CIOchat this week

They do it for blizzards and the Super Bowl.

Blog-post by John Dodge,
Community Manager
, Wed, 01/28/2015 - 14:44

How do you assess technology risk? When do you assess it? There's plenty of methodologies that do this and I've linked to a several documents below, one a risk assessment toolkit authored by the State of California CIO Michele Robinson and another NIST guidelines for assessing technology risk.

(1)
   
(2) (2)

Business Issues, Security

Is Sony the cyber security game changer?

Stars align for passage of key cyber security legislation.

Blog-post by John Dodge,
Community Manager
, Fri, 01/16/2015 - 15:53

CIO has a spot-on commentary describing how cyber criminals are closely watching how the U.S. will respond to the Sony hack. Indeed, I wrote a couple of days ago about the President and Congress promising to come together on cyber security legislation that, among other things, aims to forge a stronger relationship between government and the private sector for exchanging threat information.

(6)
   
(2) (2)

CIO Leadership, Security

Cyber security to get State of the Union treatment

#CIOchat to analyze The President's proposals to thwart cyber crime.

Blog-post by John Dodge,
Community Manager
, Wed, 01/14/2015 - 20:00

"Cyber threats pose one the gravest national security dangers that the United States faces," President Obama said in a statement last February. And now the topic will be further  elevated in our collective psyche as part of his State of the Union message next week.

(10)
   
(2) (2)

Technology, Converged Infrastructure, Security

The Internet of Things carries significant security risks

Blog-post by Mark Painter,
HP Blogger
, Fri, 08/01/2014 - 20:58
markpainter

New technologies serve to increase productivity and can improve a myriad of things. However, new technology invariably comes with a hidden security cost. To wit, there was a recent report of a refrigerator doling out spam (digital, not canned).   As it turned out, this refrigerator (like many other things ranging from door locks to thermostats) was wired and connected to the Internet.

(5)
   
(2) (2)

CIO Leadership, Cloud, Converged Infrastructure, Security

ECF's top ten blog posts for 2014

IT project management, converged infrastructure and security top the list.

Blog-post by John Dodge,
Community Manager
, Mon, 12/22/2014 - 18:42

Here's the most popular Enterprise CIO Forum blog posts as measured in page views for 2014. Note that one is from 2013 and another from 2012. However, they made the top ten list in page view popularity for 2014 (Jan. -Dec. 21 when this was being written).

To all our ECF members, we wish you a safe and happy holiday season. Here's the list:

1) Three mistakes that will get you fired

July 18, Terence Ngai, 82,928 page views

(2)
   
(2) (2)

CIO Leadership, Security

Top five priorities for the CIO in 2015

Here's mine: Tell me yours here or in the #CIOchat Thursday, 2-3 p.m. ET.

Blog-post by John Dodge,
Community Manager
, Tue, 12/16/2014 - 15:22

What are the top five priorities for the CIO in the new year? That's our #CIOchat question for Thursday, 2-3 p.m. ET. 

I'll a stab at them and would love to hear back from CIOs. You can also respond at length in our new CIO Question. My five purposely avoided technologies except security because at this high level, they are obvious: cloud, Big Data, mobile, data centers etc.

(10)
   
(2) (2)

Business Issues, Security

Banks could make retailers pay for poor data and security governance

Federal judge rules in favor of banks.

Blog-post by Myles Suer, Tue, 12/16/2014 - 23:20

A couple months ago, I reached out to a set of CIOs on the importance of good governance and security. All of them agreed that both were incredible important. However, one CIO retorted a very pointed remark by saying that “the IT leadership at these breached companies wasn’t stupid”. He continued by saying that when selling the rest of the C-Suite, the discussion needs to be about business outcomes and business benefits.  For this reason, he said that CIOs have struggled at selling the value of investments in governance and security investment.

(14)
   
(1) (1)

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, IT Performance, Mobility, Security, Services

Security in 2015: The Enterprise Begins to Favor Integrated Cloud Services vs. On-Premise Point Solutions

Blog-post by Paul Lipman, Mon, 12/15/2014 - 19:57
PaulLipman

Today’s Chief Information Security Officer (CISO) is faced with an over-load of point products (NAC, IDS, IPS, Endpoint Security, Web Gateway, Next Generation Firewall and APT to name just a few) provided by a plethora of vendors. These products are typically deployed in some on-premise configuration and tend to be difficult, if not impossible, to integrate together – resulting in severe visibility limitations across the organization’s security posture.

(1)
   
(1) (1)

Business Issues, Security

5 Information Security Trends That Will Dominate 2015

Cyber criminals "often use 21st century tools to take on 20th century systems."

Blog-post by John Dodge,
Community Manager
, Fri, 12/12/2014 - 16:09

This five trends this CIO.com article looks at are cybercrime, privacy and increasing regulation, vulnerabilities created by third party suppliers and partners, BYOx or bring your own anything or device (hellooooo, mobility); and how to educate people about the importance of good security practices.

(5)
   
(1) (1)