Monthly archives: April 2016

28 April 2016 / Leadership Development / JC Gaillard

Cyber threats are a growing concern for most organisations. However, it appears that reactive, expensive and inefficient practices are still underpinning most InfoSec strategies. As we have argued in previous articles, it is an issue that must be addre… Read more »

Read More

21 April 2016 / Strategy and Governance / JC Gaillard

How does information security end up in the portfolio of the CIO? Historically, the CIO has ended up in charge of information security in many organisations because many tactical measures required to deal with cyber threats lie in the IT field. For dec… Read more »

Read More

14 April 2016 / Strategy and Governance / JC Gaillard

Compliance and audit-oriented “tick-in-the-box” practices are still underpinning many InfoSec strategies. Huge sums of money are being spent on supposedly “one-size fits all” reactive solutions to one-off threats. However, such a firefighter mentality… Read more »

Read More

7 April 2016 / Guest Blog / Kevin Palop

The Era of Digital Use Cases During the Eighties, technology moved forward considerably. However, as is the case at each technological break point, far reaching evolutions remained un-exploitable for a long time: They were elitist, expensive and didn’t… Read more »

Read More