26 May 2016 / Leadership Development, Strategy and Governance / JC Gaillard
Cloud computing has been a hot topic for the best part of the last five years. And security considerations have been at the heart of many cloud discussions throughout. However, the context against which many Cloud decisions are made is changing. Evolut… Read more »
19 May 2016 / Strategy and Governance / JC Gaillard
Cyber Security Transformation is not about implementing yet another technology product Anybody who has spent a few years in InfoSec management has seen this happen: Following an internal near-miss or some high-profile security incident widely publicise… Read more »
12 May 2016 / Leadership Development, Strategy and Governance / JC Gaillard
Cyber threats are a reality for most organisations. However, misconceptions and misunderstandings about the true nature of InfoSec are still hindering the protection of highly strategic information assets. Here, we offer to outline key pitfalls that CI… Read more »
5 May 2016 / Strategy and Governance / Neil Cordell
Over the last few years, there has been and continues to be a significant focus on Digital Transformation. It is driven by a varied reasons from innovation focused management through to poor results and stakeholder concerns. There is clearly significa… Read more »
28 April 2016 / Leadership Development / JC Gaillard
Cyber threats are a growing concern for most organisations. However, it appears that reactive, expensive and inefficient practices are still underpinning most InfoSec strategies. As we have argued in previous articles, it is an issue that must be addre… Read more »
21 April 2016 / Strategy and Governance / JC Gaillard
How does information security end up in the portfolio of the CIO? Historically, the CIO has ended up in charge of information security in many organisations because many tactical measures required to deal with cyber threats lie in the IT field. For dec… Read more »
14 April 2016 / Strategy and Governance / JC Gaillard
Compliance and audit-oriented “tick-in-the-box” practices are still underpinning many InfoSec strategies. Huge sums of money are being spent on supposedly “one-size fits all” reactive solutions to one-off threats. However, such a firefighter mentality… Read more »
7 April 2016 / Guest Blog / Kevin Palop
The Era of Digital Use Cases During the Eighties, technology moved forward considerably. However, as is the case at each technological break point, far reaching evolutions remained un-exploitable for a long time: They were elitist, expensive and didn’t… Read more »
30 March 2016 / Strategy and Governance / Corix Partners
Cyber threats have a global reach and target all industry sectors. But the Wealth Management industry makes a particularly attractive target because it handles large amounts of capital associated with high profile wealthy clients, and is also home of a… Read more »
24 March 2016 / Guest Blog / Rick Warley
The proposed guidance from the FCA for firms outsourcing to the Cloud is a ray of sunshine in a regulatory environment that is usually cast with the gloom of extra work and additional costs. Nowadays, with financial institutions relying heavily on tech… Read more »
