Corix Partners black banner

26 May 2016 / Leadership Development, Strategy and Governance / JC Gaillard

Cloud computing has been a hot topic for the best part of the last five years. And security considerations have been at the heart of many cloud discussions throughout. However, the context against which many Cloud decisions are made is changing. Evolut… Read more »

Read More

19 May 2016 / Strategy and Governance / JC Gaillard

Cyber Security Transformation is not about implementing yet another technology product Anybody who has spent a few years in InfoSec management has seen this happen: Following an internal near-miss or some high-profile security incident widely publicise… Read more »

Read More

12 May 2016 / Leadership Development, Strategy and Governance / JC Gaillard

Cyber threats are a reality for most organisations. However, misconceptions and misunderstandings about the true nature of InfoSec are still hindering the protection of highly strategic information assets. Here, we offer to outline key pitfalls that CI… Read more »

Read More

5 May 2016 / Strategy and Governance / Neil Cordell

Over the last few years, there has been and continues to be a significant focus on Digital Transformation. It is driven by a varied reasons from innovation focused management through to poor results and stakeholder concerns.  There is clearly significa… Read more »

Read More

28 April 2016 / Leadership Development / JC Gaillard

Cyber threats are a growing concern for most organisations. However, it appears that reactive, expensive and inefficient practices are still underpinning most InfoSec strategies. As we have argued in previous articles, it is an issue that must be addre… Read more »

Read More

21 April 2016 / Strategy and Governance / JC Gaillard

How does information security end up in the portfolio of the CIO? Historically, the CIO has ended up in charge of information security in many organisations because many tactical measures required to deal with cyber threats lie in the IT field. For dec… Read more »

Read More

14 April 2016 / Strategy and Governance / JC Gaillard

Compliance and audit-oriented “tick-in-the-box” practices are still underpinning many InfoSec strategies. Huge sums of money are being spent on supposedly “one-size fits all” reactive solutions to one-off threats. However, such a firefighter mentality… Read more »

Read More

7 April 2016 / Guest Blog / Kevin Palop

The Era of Digital Use Cases During the Eighties, technology moved forward considerably. However, as is the case at each technological break point, far reaching evolutions remained un-exploitable for a long time: They were elitist, expensive and didn’t… Read more »

Read More

30 March 2016 / Strategy and Governance / Corix Partners

Cyber threats have a global reach and target all industry sectors. But the Wealth Management industry makes a particularly attractive target because it handles large amounts of capital associated with high profile wealthy clients, and is also home of a… Read more »

Read More

24 March 2016 / Guest Blog / Rick Warley

The proposed guidance from the FCA for firms outsourcing to the Cloud is a ray of sunshine in a regulatory environment that is usually cast with the gloom of extra work and additional costs. Nowadays, with financial institutions relying heavily on tech… Read more »

Read More


Previous Page 25 of 31 Next