Regulatory Compliance Drives IT Security in 2015

Cybersecurity is the CCO’s Monkey. A Lookback at a Landmark Year for Cybersecurity If 2013 represented a flashpoint for Cybersecurity, the year in which front-page breach, Advanced Persistent Threats, and the Presidential Executive Order (13636) ignited public awareness, 2015 is the year in which Regulatory response has fueled the fully engulfed fire. At [...]

By |2018-01-18T10:24:37-05:00December 14th, 2015|Cyber Security|Comments Off on Regulatory Compliance Drives IT Security in 2015

Information Governance Part 2: WHY You Need A Program

11 Key Reasons To Develop a Governance Plan For much of the Information Age, allowing information (even after its business function is fulfilled and there is no other obligation to keep it) to accumulate was relatively risk-free since storage devices were so cheap. But recently, three important developments have changed all this: [...]

By |2018-01-20T11:21:38-05:00December 1st, 2015|Governance, Information Security|Comments Off on Information Governance Part 2: WHY You Need A Program
Go to Top