Monthly archives: April 2015

30 April 2015 / Strategy and Governance / JC Gaillard

  To many organisations, Information Security is something which has historically been approached from an audit or compliance perspective. Questions such as “what do we need to do in order to correct these audit issues?” and “which boxes do we nee… Read more »

Read More

24 April 2015 / JC’s Column / JC Gaillard

Describing Cyber Security as a risk is a language oddity that keeps appearing at an alarming rate. We have already highlighted this in an earlier article in March published on Computing.co.uk. It is a dangerous and simplistic shortcut, typical of the s… Read more »

Read More

16 April 2015 / Strategy and Governance / JC Gaillard

This article examines the organisational relationships between the role of the Chief Information Security Officer (CISO) and the corporate environment around it, with a focus on why reporting lines are essential and how they should be structured. Why i… Read more »

Read More

7 April 2015 / Guest Blog / John Vincent

  Cyber insurance is a growing market in the UK.  Although it has been on the rise in the last few years, it still lags way behind the US who have a far more advanced cyber insurance market. The main reason for this is legislation. In the US most… Read more »

Read More

2 April 2015 / Strategy and Governance / JC Gaillard

Effective Vendor Risk Management revolves around ensuring that third party vendors implement clear and comprehensive controls across their environment in order to minimise risk for their clients. In order to gain real value from a Vendor Risk Managemen… Read more »

Read More