Results for the tag,

 

Risk Management

Risk Management: Risk management is the identification, assessment, and prioritization of risks (defined in ISO 31000 as the effect of uncertainty on objectives, whether positive or negative) followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities. (Source: Wikipedia)

Carrying the Can - Consumerisation and Enterprise Mobility


Section: Research
There is an increasing trend among employees to want to use their personal choice of mobile device in the fulfilment of their work commitments. While this appears to bring many benefits for the employee to select their preferred device or devices and, on the face of it, reduces upfront costs for their employer, it does introduce significant on-going costs and risks for the organisation.   However, with many appealing mobile consumer devices being offere ...   read more

Managing 21st Century Networks - A World of Convergence


Section: Research
The Internet Protocol (IP) - used for transmitting data across networks everywhere - has moved beyond its origins. Once one of many, it has become a near standard for all types of computer communication. It is used pervasively, transmitting data to and from a multitude of devices ranging from those in our pockets to spacecraft circling distant planets. Arguably IP is the most successful open standard ever, but as network communications converge under a single standard used for an increa ...   read more

Winning Outsourcing Strategies


Section: Research
Outsourcing is a strategy increasingly being used by organisations to reduce costs and increase value. Outsourcing, however, has its risks. As organisations look to push out more of their custom software application development needs to outsourcing partners, careful planning is required in terms of building stringent software security requirements into contracts and creating a process and metrics to ensure that those requirements are met. This report examines outsourcing practic ...   read more

The Evolution of Web Threats - Are your colleagues putting your business at risk?


Section: Research
This presentation was given at an Info Security Magazine webinar in Nov 2009. It looks at how web threats are evolving and what action can be taken.   We must never lose site of the how critical to all businesses the web has become and attempts to control its use should not hamper communications and productivity.   Remote working is common practice across all sectors and the web is key to achieving such work place flexibl ...   read more

Managing Information Risk


Section: Research
With organisations being so dependent on the electronic capture, storage and retrieval of increasing amounts of information, how well are they coping with modern-day requirements? KEY FINDINGS Loss of critical information is the most prominent risk in today's business environment When asked to what degree different categories of risk are considered during the business planning process, 715 senior IT ...   read more

IT Security in the Real World - A Value Proposition


Section: Research
  A graphical presentation that will provide answers to the following questions:   What risks does IT security mitigate? What is the value of IT security? OK, so it is worth having IT security; but how do we keep the cost down? How to build a compliance oriented architecture at an affordable cost?     read more

A Value Proposition for IT Security


Section: Research
IT departments are facing three big issues when it comes to protecting the data created and stored on the systems they manage. First, the value of the data is often only realised when it is legitimately shared in some way; second, that sharing is increasingly taking place across public networks and third, the users doing the sharing are doing so on a growing diversity of devices in locations that are convenient to them. Whilst the three issues hel ...   read more

11 Points to Prepare for Cloud Adoption


Section: Articles
With cloud adoption rapidly accelerating, today’s IT leaders must learn to execute dramatic shifts in IT technology, processes and staffing, or else suffer the consequences of poor cloud integration. What steps should decision makers take to ensure their departments and organisations thrive inside the cloud? The following are eleven essential points to prepare for cloud adoption in today’s IT environment.   Prepare for the shift. It can be te ...   read more

BT: London 2012 Most Connected Games Ever


Section: News
As the 2012 Olympic Games swiftly approach, BT has detailed some of the challenges that they and others involved in the technology side of the Games have faced over the past four years. The communications company will be providing telephone and data connections to Olympic venues, as well as the athlete’s village and Olympic Park. BT said that London 2012 will be "the most connected games ever” and that they have done everything they can to ensure that the infrastructure is in pl ...   read more

Cloud computing insurance is 'not a liability panacea'


Section: News
Getting cyber risk insurance to cover the liabilities associated with cloud computing is not a "panacea", according to two esteemed Gartner researchers. Vice president of research Drue Reeves and research fellow Daryl Plummer have said that one of the major drawbacks of cloud computing liability insurance is its high cost. Placeholder0Writing for the Financial Times, Mr Reeves and Mr Plummer claimed that policies can cost hundreds of thousands of pounds - and that' ...   read more

Cloud computing risk factors Part 2: The bogeymen continue


Section: Articles
Cloud computing risk factors, both real and imagined, continue to lurk around every corner. But rather than running in the opposite direction as fast as one possibly can, the more appropriate response is to acknowledge that there are risk factors in the cloud, as there are with any other business computing model; to weigh those risks against potential rewards, and to exercise due diligence and best practices in mitigating those risks.     &n ...   read more

Cloud security 'enough to mitigate the risks for most firms'


Section: News
For the majority of businesses, the benefits of migrating to the cloud "wildly outweigh the potential risks", according to an expert in the sector. Placeholder0Joe Drumgoole, founder of business app deployment and management firm FeedHenry, asserted that the concerns decision-makers have about cloud security and accessibility are "kind of redundant". Research conducted by KPMG earlier this month revealed that 69 per cent of busi ...   read more

'Growth is dependent on IT security'


Section: News
The UK's economic future is dependent on the widespread adoption of high-quality IT security solutions - particularly secure online transaction technology. According to Owen Pengelly, deputy director of policy at the Office for Cyber Security and Information Assurance in the Cabinet Office, people need to have trust in technology if the UK is to maintain economic growth. Placeholder0Speaking at the 2011 Trusted Computing Seminar, the minister noted that there is both an economic a ...   read more

Hedge funds opt for private clouds for security benefits


Section: News
Private cloud computing solutions are becoming increasingly popular among hedge fund administrators as they offer greater security benefits and data protection, it has been claimed. Placeholder0Speaking to Financial News, managing director of technology solutions for SEI Investment Manager Services Jim Warren observed that while cloud computing offers numerous benefits for his organisation, it is wary about embracing something that could put the data of clients at risk. < ...   read more

IT risk management 'to become a big expenditure'


Section: News
IT risk management strategies are going to become a big area of expenditure for businesses, particularly those in the financial services sector, as information security becomes a top liability, according to IDC. The research specialist claims the market will be worth $74 billion (£46 billion) globally by 2015. Placeholder0In its Worldwide Risk Technology Spending - 2011 Analysis and Forecast report, the firm looks at the various aspects of the market - including enterpris ...   read more

Moving to the cloud: All-in, or a-la-carte


Section: Articles
A decision to "move to the cloud” is often described incorrectly, as an enterprise often makes that decision strategically on a case-by-case basis. The question is not whether the cloud is appropriate for business. It is. The question rather, is whether the cloud is appropriate for specific uses within the business. The resulting strategy then, is less focused on deciding whether to move to the cloud at all. The first step in a cloud strategy is to undertake a cloud asses ...   read more

Prudent security provisions 'can protect SaaS users'


Section: News
Businesses planning to utilise software-as-a-service (SaaS) should ensure they set up strong security systems to protect their data, according to a former Hewlett Packard IT services engineer. Placeholder0Writing for Information Week, Kurt Marko warned that firms running their enterprise on the internet are vulnerable to cyber-crime such as cross-site scripting attacks and identity theft. However, he observed that there are steps firms can take to minimise the chance that they wil ...   read more

US government to adopt cloud security standards


Section: News
The US government looks set to adopt a standard set of cloud security rules for service providers - a move that is expected to boost domestic cloud-based infrastructure uptake. The government's Federal Risk and Authorization Management Program (FedRAMP) would allow government bodies to effectively assess and monitor cloud computing service providers' security provisions by setting minimum s ...   read more

Virtualisation and Consumerisation of IT: Lessons from IT First Movers


Section: Articles
What can we learn from IT leaders who have taken risks in the areas of virtualisation and consumerisation of IT? At the recent InformationWeek 500 conference held in Dana Point, California, IT first movers recently discussed the challenges of balancing risk and reward in these still-developing arenas. Here are some insights gleaned from IT leaders who were quick to move outside traditional IT comfort zones.   read more

1