Remove 01
article thumbnail

How to develop a robust cyber security policy

IT Governance

A cyber security policy outlines an organisation’s cyber security defence strategy. No matter how resilient your cyber security strategy is, you must always account for employees’ susceptibility to mistakes. This reduces the damage in the event that an employees’ account is compromised. What is a cyber security policy?

article thumbnail

Next-gen, real-time data exchanges will power the energy industry

CGI

Wed, 05/01/2019 - 22:32. Now in its eighth year, the event brings together global energy experts and influencers to debate and discuss the future of central market operations. As the event draws closer, it is interesting to see how data exchanges in utilities are changing purpose following the liberalization of the energy market.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Untangling the challenge of digital change management in the federal government

CGI

Wed, 08/01/2018 - 05:39. Fortunately there are more and more success stories to share, as evidenced at the recent event hosted by FCW and sponsored by CGI entitled, “Digital Transformation: IT Strategies for the Modern Agency.” Untangling the challenge of digital change management in the federal government.

article thumbnail

Today’s financial consumer: Open for business (part 1 of 2)

CGI

Sun, 01/07/2018 - 01:48. The relative ranking of value did not change from last year’s results, with protection leading all demographic groups and countries—not too surprising in light of recent events that only add to consumers' concerns about cyber attacks, identity fraud and other security risks.

article thumbnail

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example

CGI

Wed, 01/10/2018 - 15:25. As these examples demonstrate, a strategy for ownership, access, sharing and visualization of data is needed to enable new value chains to exist. A variety of open data could be owned by or at least available to the city to monitor, control and predict events.

Mining 78
article thumbnail

From Fiction to Reality - A Zero Trust Network Access Overview

Thales Cloud Protection & Licensing

Fri, 01/07/2022 - 06:54. Defined by Gartner in 2018, the term ZTNA refers to a technology that allows Zero Trust ideas to be put into practice. Again, the idea behind the Zero Trust strategy is primary, and ZTNA as well as other frameworks that came later are implementations of what this concept can offer in practical terms.

Access 71
article thumbnail

How to Improve Email Security for Enterprises & Businesses

eSecurity Planet

However, adoption of these protocols should be a priority for growing organizations and is already a federal requirement since 2018 as part of the Department of Homeland Security (DHS) 18-01 binding operational directive. The smallest organizations may not have the resources to establish these protocols.