Posts categorized: Strategy and Governance
7 May 2015 / Leadership Development, Strategy and Governance / JC Gaillard
Think of Information Security as a Control function and not as a Support function. There is a commonly held view across Information Security communities that Information Security should be an “enabler” to the business. This is simply the wrong debate a… Read more »
30 April 2015 / Strategy and Governance / JC Gaillard
To many organisations, Information Security is something which has historically been approached from an audit or compliance perspective. Questions such as “what do we need to do in order to correct these audit issues?” and “which boxes do we nee… Read more »
16 April 2015 / Strategy and Governance / JC Gaillard
This article examines the organisational relationships between the role of the Chief Information Security Officer (CISO) and the corporate environment around it, with a focus on why reporting lines are essential and how they should be structured. Why i… Read more »
2 April 2015 / Strategy and Governance / JC Gaillard
Effective Vendor Risk Management revolves around ensuring that third party vendors implement clear and comprehensive controls across their environment in order to minimise risk for their clients. In order to gain real value from a Vendor Risk Managemen… Read more »
5 March 2015 / Strategy and Governance / JC Gaillard
Corix Partners have recently been featured on Enterprise CIO Forum, publishing our commentary article on one of this year’s biggest Cyber Security reports ‘Towards the Quantification of Cyber Threats’. The 2015 report was published by the Partnership f… Read more »
25 February 2015 / Strategy and Governance / JC Gaillard
How to deal with cyber threats in today’s hyperconnected world.
19 February 2015 / Strategy and Governance / JC Gaillard
This article explores the definition of Governance within the context of Information Security – discussing the core processes involved in implementing a Governance framework, the theories behind influencing lasting organisational change to protect from cyber threats, and the challenges associated with this.
