This template will help you organize your various security communication efforts with different stakeholders.
|
|
Communication between security and the rest of the business can be difficult because the two parties often speak different languages. Your security messages should be...
|
|
Use this tool to map business and IT initiatives to specific security mitigation controls. This tool is a documentation and mapping support tool as part of your larger...
|
|
In this week's issue, members will get a view of a completely new computing environment, from Pattern Recognition Processors out to a new secure Net running as a...
|
|
What would happen if you got the best people in the world in neuroscience, stem-cell research, chip design, software, satellites, transportation, broadband, big-data...
|
|
Use this template to define a specific process for managing information security incidents to minimize their impact on the organization.
|
|
Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|
I would like to thank Scott Foster for continuing to provide all of us with detailed views of Asian technology and business strategic moves that are often not carried by...
|
|
I was tempted to write something more on China this week, given the effect of that nation's destabilizing economic situation on global equity markets; and in fact, it now...
|
|
Before getting started on your personal development as CIO, ensure you are ready to become a strategic partner.
|
|