No items have been added to your cart yet
Expand your knowledge on topics related to digital transformation.
Shortcomings in IT governance and in the skills and competencies of boards to provide the requisite direction for digital transformation (DX) mean that boards in general are ill-equipped for DX oversight and for the nature of the decisions required to effectively achieve it.
It is often said that data are the new oil. This adage signifies not only how vital and valuable data are.
There has been no shortage of data privacy laws enacted in the past few years. The one that has received the most attention is the EU General Data Protection Regulation (GDPR).
IT and security professionals tend to have a high degree of focus on tools and technology. While some place additional focus on processes.
The advancement of technology from analog electronics and mechanical devices to the digital technology available today emerged in the 1980s, when the Third Industrial Revolution was born.
Digital business models expand the numbers of an organization’s identities. Using new technologies to increase revenue and streamline business operations creates interconnected digital ecosystem.
The Directive on Security of Network and Information Systems (NIS Directive) has been transposed into law in many European countries.
What is the biggest security challenge that will be faced in 2020?
The job of auditors has always been interdisciplinary. At the core of the auditor’s professional development is a multitude of disciplines—including accounting.
A speaker at a conference I recently attended stated that “Organizations must adopt digital transformation to stay ahead in business.”
Does the IT risk management process differ from organization to organization?
In recent years, information security has evolved from its traditional orientation, focused mainly on technology, to become part of the organization’s strategic alignment, enhancing the need for an aligned business/information security policy.
Awareness of the risk to enterprise information assets through the supply chain surged after the 2013 Target Corp. data breach.
Implementing the EU General Data Protection Regulation (GDPR) is a significant challenge for most enterprises because it requires many to completely change their perception of personal data security.
The rapid and sustainable advancement of the IT environment has improved domestic and industrial operations and connectivity.
Occupational fraud, e.g., internal theft, employee fraud and asset misappropriation, plagues enterprises of all sizes.
As one of the strictest regulations related to data protection and privacy, the EU General Data Protection Regulation (GDPR) has attracted attention from countries all over the world.
Increasingly, organizations connect their on-premises infrastructures to cloud-based technologies, both from a Software-as-a-Service (SaaS) and an overarching infrastructure perspective.
Humans represent a mystery to be deciphered by security/cybersecurity experts because their behaviors, attitudes, beliefs, rituals and decisions (the general characteristics that define a culture) constitute a little-understood universe for executives and their heads of security.