IIIS: More pictures from the Implementing Information Infrastructure Symposium
Data governance, risk, compliance and much more
A new service from Australian research and consultancy firm Security in Depth aims to help enterprises minimise risk through a new ‘credit score’-style rating that assesses the security maturity of suppliers that integrate with their systems.
With cyber security threats on the rise worldwide, companies have begun utilising traditional risk transfer mechanisms, like insurance, to try and mitigate cost impacts if a data breach occurs.
Tackling a risk-averse corporate culture is critical for companies transitioning to the cloud, says Krist Davood, group CIO, Court Services Victoria.
The mobile industry has reassured travellers that mobile phones don’t interfere with airplanes or ignite fires at automobile petrol stations.
Does offshore outsourcing make an IT organization more vulnerable to data loss or attack? Or are offshore providers actually improving network security for their customers?
This white paper will explain why privileged identities pose such a risk to enterprises, how they are compromised by attackers, how current methods fail to stop these threats, and how your organization can protect itself.