Blog Posts Tagged with "Budgets"
CFO’s Don’t Want to Get it When it Comes to Risk and Security…Until it’s Too Late.
February 06, 2014 Added by:Stephen Marchewitz
According to Ponemon estimates (PDF), the breach will cost Target over $2 Billion dollars. Will Target's CFO get fired? He probably couldn’t spell security before the incident, but had to testify before congress about what they’re going to do…talk about your crash courses.
Comments (1)
CISO Challenges: The Build vs. Buy Problem (1:2)
January 21, 2013 Added by:Rafal Los
Change control, application security reviews, incident response, policy review, audit preparation, acquisition due-diligence... all of these require people, money and time - but you've got it all in short supply. Here's one way of looking at making the decision of what to build, and what to outsource...
Comments (0)
European Commission supports research on Cyber security
November 28, 2012 Added by:Plagiarist Paganini
Cyber security is considered a primary target for every governments, the increase of cyber criminal activities, state-sponsored operations and the rise of hacktivism requires the use of additional resources to counteract these phenomena...
Comments (0)
Low-Cost Ways to Make Your Network More Secure
November 26, 2012 Added by:Marc Quibell
There are improvements you can introduce that are seamless, low-cost , don't present a new burden to your users, and/or are easy to implement. So in between your major IT Security projects that may or may not happen, why not improve you security posture and lower your overall risks?
Comments (2)
Resource Scarcity in Information Security - Part 2
November 19, 2012 Added by:Robb Reck
In our last post we discussed how to deal with resource scarcity and why the only effective strategy involves reducing the team’s scope. In this post I will dive into how we can reduce the information security team’s scope of work while preserving the value delivered to the business to the greatest extent possible...
Comments (0)
The Security ROI "Death Spiral"
November 18, 2012 Added by:Rafal Los
The worst thing that can happen to a CISO is to get trapped in the ROI Death Spiral. I know, I know, we’ve all been told that we need to justify cost, manage expense, use the tools our companies provide us, etc. CISOs that don’t play by the rules won’t get anywhere...
Comments (0)
CISO Concerns: Security vs. Usability, Affordability
October 25, 2012 Added by:Rafal Los
Recently in New York city we hosted a CISO-level event where we discussed various issues experienced during the life of an enterprise security program. CISOs brought up various topics from budgeting to being overwhelmed with constantly evolving threats - but one in particular caught my attention...
Comments (2)
The Cyber Money Train
October 15, 2012 Added by:Joel Harding
Anything to do with Cyber equates to a lot of money. One estimate for CY 2012 was $13 Billion being budgeted for cybersecurity just for the US government. One study I read predicted we would need to increase spending by up to 1,800 percent. That, ladies and gentlemen, is a big chunk of change...
Comments (1)
The Right Way to Handle Shrinking Budgets
September 09, 2012 Added by:Robb Reck
We add new security tools by seldom get rid of the old ones. So, it’s no surprise that when our companies require us to reduce our budgets we don’t really know how to do it. In the face of these tightening budgets we need to adapt and survive. This leaves us with three options...
Comments (0)
The Future Ain’t Homogenized: Please Stop the FUD Vendors
August 15, 2012 Added by:Ben Kepes
At the end of the day, if is slightly cheaper to own your hardware than to rent, the fact is that if in doing so you have to spend time focusing on technology instead of focusing on your core business, then that savings pales into insignificance when compared to the real value that pure focus can bring...
Comments (0)
Get a BYOD Policy Now
August 09, 2012 Added by:Michelle Drolet
There’s no one-size-fits-all solution. In creating a policy you have to consider what devices to support, how much access to give them, and what kind of budget to allocate. Do you have specific compliance issues? Are you willing to subsidize data plans or device purchases? How do you ensure company data is secure?
Comments (0)
Ten Things I’ve Learned About Cloud Security
July 17, 2012 Added by:Bill Mathews
Cloud security is tough for a lot of reasons, not least of which is because you probably only understand the basics of what you interface with - the controls the provider allows you to see. This lack of depth of management introduces many security related challenges. Having said that, let’s explore...
Comments (0)
Security: It’s All About (Human) Networking...
July 15, 2012 Added by:Tripwire Inc
Want to add layers, or change your defense in depth approach? Your Information Systems team is just the beginning. What business unit will you impact? How will they be impacted, and when is the optimum time to do this? Depending on scope, this could even ripple through your business continuity program...
Comments (0)
Navigating the Minefield of Mobile Technology Purchasing
July 10, 2012 Added by:Patrick Oliver Graf
In organizations, there is a constant struggle between satisfying the technological needs of workers while maintaining an adherence to compliance and security. Remote access represents the next major iteration of this battle. This complexity also means there’s far more overlap between the pain points...
Comments (0)
Why Open Source is Not Always the Best Bet
July 02, 2012 Added by:DHANANJAY ROKDE
Although open source software appears fantastic at the outset, they often come with an indirect price to pay, and it takes a lot of time for the organization to realize this. If your organization is hit by the ‘using open source to reduce costs’ wave, here are a few points you to look at before taking the leap...
Comments (1)
The Patchwork Cloud: To Rent or Buy Your Cloud?
June 27, 2012 Added by:Rafal Los
One cloud does not fit all. Your cloud should be customized to fit your business. I believe that if you're going to have a cloud strategy you need to have a pragmatic approach which has you doing your due diligence, proper risk analysis, and understanding your cloud vendor...
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider