Risk Management — News

Embedding risk culture

An observation from the global financial crisis is that organisations with a weak risk culture can experience extensive or even catastrophic damage. Significant investment in risk management people, processes and technology is only part of a sound business risk environment. The key component is the risk culture.

David Roche | 28 Feb | Read more

Security Operations the Final Frontier – Part III

Security Operations, as a capability, was discussed in the first article of this series: Security Operations the Final Frontier. This was a response to media coverage of a other operations in which information was compromised and data assets were stolen - Operation Shady RAT, Operation Aurora and Operation Night Dragon.

Puneet Kukreja | 20 Dec | Read more

How to have real risk management

Our coverage of the annual Global Information Security Survey conducted by CSO and CIO magazines in partnership with PwC has sparked some interesting discussions about <a href="http://www.csoonline.com/article/690854/are-you-an-it-security-%20leader-really-">what it takes to be a security leader</a>. Specifically, the discussion is about how organizations can move <a href="http://www.csoonline.com/article/691069/laggard-to-leader-what-it-takes-to-get-there">from being a security laggard to something better</a>. As part of those discussions, we spoke with Andy Ellis, chief security officer at Akamai Technologies. Ellis is responsible for overseeing the security architecture and compliance of the company's globally distributed network and sets the strategic direction of its security.

George V. Hulme | 02 Nov | Read more

Got cyber insurance?

<a href="http://www.networkworld.com/news/2010/010810-heartland-to-pay-up-to.html">Heartland Payment Systems</a> figured it was in pretty good shape when it took out a $30 million cyber insurance policy. Unfortunately, the credit card transaction processor was the victim of a massive data breach in early 2009 that resulted in losses estimated at $145 million. The insurance company did pay Heartland the $30 million, but the company was on the hook for the remaining $115 million.

Lamont Wood | 24 Oct | Read more

IT Audit Survey Exposes Weak Risk Assessment

Even in the face of costly and embarrassing corporate security breaches, one in four companies fails to conduct any IT risk assessment. And 42% say there are areas of their information technology audit plans that cannot be addressed because of a lack of resources and expertise.

Roy Harris | 06 Oct | Read more

How to create a risk register

A Risk Register, also referred to as a Risk Log, is a master document which is created during the early stages of your project. It is a tool that plays an important part in your Risk Management Plan, helping you to track issues and address problems as they arise.

CIO Staff | 19 Sep | Read more

Security Operations the Final Frontier – Part II

I have created my own interpretation of what a good pragmatic Security Operations Model (SOM) would look like. This has been adapted from a number of Security Frameworks and Industry Good Practices like ITIL, COBIT, NIST, OCTAVE, OWASP and the ever present ISO 27001/2 all of which have an input into the structure and makeup of an effective security operations framework or security operations model.

Puneet Kukreja | 13 Sep | Read more

Opinion: Risk Assessments Are Not Worth the Risk

For years, professionals of the information security industry have been advising and using risk-based approaches to securing organisations and their information assets. This has been the received wisdom for so long that this is now encompassed in industry standards, such as ISO 27001, FIPS 200, etc.

Charles Wale | 19 Aug | Read more

Leverage government innovation to reduce identity management risks

Managing consumer or citizen identities comes with two key problems--scale and cost--prompting organizations that require onboarding, authentication, and <a href="http://www.csoonline.com/article/684895/password-management-systems-how-to-compare-and-use-them">password management</a> to look for ways to outsource this effort. Entertainment websites, online retailers, and even US federal government-to-citizen websites are experimenting with a federated model for more of their identity management life cycle. By using single sign-on (SSO) and attribute-sharing between "social" identity providers (IdPs) (i.e. Google and Facebook) and relying parties (RPs), this model effectively reduces cost and improves the customer experience.

Eve Maler | 14 Jul | Read more

Dropbox left document storage accounts open for four hours

Online storage service Dropbox accidentally turned off password authentication for its 25 million users for four hours on Monday -- although "much less than 1 percent" of those accounts were accessed during the period, the company said. It is still investigating whether any of those accounts were improperly accessed.

Jeremy Kirk | 21 Jun | Read more

A new security architecture for the cloud

Members of the Open Group's Security for the Cloud and SOA Project have launched a new <a href="http://www.csoonline.com/article/505871/the-curse-of-cloud-security">security architecture for the cloud</a>, to help security organizations better understand the unique security aspects of cloud computing.

Bob Violino | 20 Jun | Read more