article thumbnail

Turn up the volume with Table Top Exercises

OpenText Information Management

… The post Turn up the volume with Table Top Exercises appeared first on OpenText Blogs. The book covers the fundamentals and field proven strategies to assist organizations enhance their ability to find, analyze, and respond to cyber threats proactively and reactively through their Security Operations Center (SOC).

article thumbnail

Merging top-down and bottom-up planning approaches

IBM Big Data Hub

This blog series discusses the complex tasks energy utility companies face as they shift to holistic grid asset management to manage through the energy transition. However, they follow different approaches to risk management by using a risk matrix to assess risk at the start of an optimization cycle.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Leaders Can Lower Expenses While Reducing Risk

Lenny Zeltser

You’ll help reduce risk, cut costs, and build goodwill with your colleagues. Consider this a thought exercise that assumes zero cybersecurity expenses at the start, then adds expenses to the list with an explicit business justification for each project you’d like to fund.

Risk 52
article thumbnail

ISO 27001: Gap analysis vs. risk assessment

IT Governance

Gap analyses and risk assessments are two of the most important processes organisations must complete when implementing ISO 27001 or reviewing their compliance status. This could be a simple tick-box exercise, with the unchecked requirements forming the gaps that might need to be addressed (not all clauses need to be implemented).

Risk 83
article thumbnail

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

The Last Watchdog

International workforces can be an excellent way to find top talent, but they can introduce unique security risks. Similarly, different nations exercise varying amounts of authority over internet traffic. While most governments won’t likely do anything nefarious with this information, it does heighten the risk of a data breach.

article thumbnail

The U.S. Chamber of Commerce Foundation and IBM explore generative AI’s applications for skills-based hiring

IBM Big Data Hub

Leaders are increasingly recognizing the power of AI as well as its potential limitations and risks. Chamber of Commerce Foundation is considering the opportunities and potential risks of solutions harnessing AI, particularly related to skills-based hiring. The users of this solution would represent a wide variety of communities.

article thumbnail

FTC Posts Third Blog in Its “Stick with Security” Series

Hunton Privacy

On August 4, 2017, the FTC published the third blog post in its “Stick with Security” series. Additionally, a clean desk policy minimizes the risk that data may be accessed by an unauthorized person after hours. The FTC’s next blog post, to be published Friday, August 11, will focus on secure passwords and authentication.

IT 40