Patch Management PracticeJournal2206/17/2019 3:11 PMSecurity1
Three Steps to Begin Transforming Your Cybersecurity ProgramJournal2206/13/2019 3:03 PMSecurity2
Increasing Your Organizaton’s CybermaturityJournal2206/10/2019 2:57 PMSecurity0
Innovation Is About PeopleJournal2206/3/2019 3:37 PMCOBIT-Governance of Enterprise IT 0
The Role of Culture on IT GovernanceJournal2205/30/2019 3:05 PMCOBIT-Governance of Enterprise IT 0
Sharpening the AxeJournal2205/28/2019 3:04 PMAudit-Assurance0
The Role of Incident Management in Identifying Gaps During Stabilization PeriodJournal2205/20/2019 3:06 PMRisk Management0
The Importance of CyberresiliencyJournal2205/6/2019 3:34 PMSecurity0
Building an Audit Program for AWSJournal2204/29/2019 3:06 PMAudit-Assurance0
The Impact of the Thailand Cybersecurity LawJournal2204/22/2019 3:03 PMSecurity1
Simplifying Enterprise Risk AnalysisJournal2204/8/2019 3:12 PMRisk Management0
Proactively Embracing InnovationJournal2204/1/2019 2:58 PMAudit-Assurance0
Defining the Role of the CISO Journal2203/28/2019 2:59 PMSecurity0
Cybersecurity Auditing SkillsJournal2203/25/2019 3:00 PMSecurity0
How to Ensure Data Privacy and Protection Through Ecosystem IntegrationJournal2202/25/2019 2:46 PMPrivacy1
Getting Your GDPR Compliance Program Into Gear With Proper Record KeepingJournal2202/18/2019 3:08 PMGovernment-Regulatory0
More on Password DictionariesJournal2202/14/2019 3:02 PMSecurity1
For the Board, GDPR Compliance Implementation Reporting Is More Than Just About Exposure and ProgressJournal2202/11/2019 3:13 PMGovernment-Regulatory0
Practical DLP ImplementationJournal2201/28/2019 3:09 PMGovernment-Regulatory0
Auditing the GDPRJournal2201/22/2019 2:47 PMAudit-Assurance0
What Are Challenges in Deployment and How Can They Be Mitigated?Journal2201/3/2019 2:57 PMRisk Management0
Bound to HappenJournal22012/17/2018 3:03 PMSecurity0
The New Normal: The Learning OrganizationJournal22012/3/2018 3:07 PMSecurity1
A Healthy Way to Think of MetricsJournal22011/26/2018 3:01 PMSecurity3
Optimism and the Audit ProfessionJournal22011/19/2018 3:05 PMAudit-Assurance0
Leveraging Employee Resource Groups to Build Diverse IT Audit TeamsJournal22011/12/2018 3:13 PMAudit-Assurance1
A Career in Artificial IntelligenceJournal22011/8/2018 3:07 PMSecurity3
Board Involvement in Digital Strategy and OversightJournal22010/15/2018 3:03 PMCOBIT-Governance of Enterprise IT 1
The Potential Impacts of Blockchain on the Auditing ProfessionJournal22010/8/2018 2:51 PMAudit-Assurance1
If Digital Transformation Is Hard, Your Board May Be Lacking Key Skills and ExperiencesJournal22010/1/2018 11:00 AMCOBIT-Governance of Enterprise IT 2
Privileged Access Management and Implementing It Smartly Journal2209/24/2018 3:10 PMSecurity1
The Growing Scope of the IoTJournal2209/17/2018 3:07 PMAudit-Assurance0
Adding Audit ValueJournal2209/10/2018 3:02 PMAudit-Assurance0
How to Implement MFT for Data ProtectionJournal2209/4/2018 3:18 PMGovernment-Regulatory4
Decision Analysis of Ransomware Incidents Journal2208/30/2018 3:31 PMSecurity1
Key Steps in a Risk Management Metrics ProgramJournal2208/27/2018 2:50 PMRisk Management3
The Benefits and Risk of Blockchain TechnologyJournal2208/20/2018 3:11 PMRisk Management0
Knowing What to ProtectJournal2208/16/2018 2:38 PMSecurity1
SWIFT Infrastructure Needs to Be Secured in a Structured MannerJournal2208/13/2018 2:47 PMSecurity0
Love Them or Loathe Them, Good IT Business Cases Are of Inestimable Value to Good IT Portfolio ManagersJournal2208/6/2018 3:16 PMRisk Management0
Managing Technology Innovation EfficacyJournal2208/2/2018 3:06 PMCOBIT-Governance of Enterprise IT 0
Privacy Matters MatterJournal2207/26/2018 3:05 PMPrivacy0
Skills You Will Not Find on a ResumeJournal2206/25/2018 3:08 PMAudit-Assurance1
The Assessment Will Help Your Organization Tackle Any Security ObstacleJournal2206/18/2018 3:03 PMSecurity0
Formalizing the Cybersecurity Role in MDMJournal2206/11/2018 3:08 PMSecurity0
Understanding the Threat LandscapeJournal2206/4/2018 3:06 PMSecurity0
Establishing a Triumvirate—Understanding the Interests for Enhancing Collaboration Between the CISO, the CIO and the CROJournal2205/21/2018 4:00 PMSecurity0
Leveraging SOC Use CasesJournal2205/17/2018 3:17 PMSecurity0
How Blockchain Technology Will Revolutionize the Global Workforce and Education SystemJournal2205/7/2018 3:03 PM0
Security of CurrenciesJournal2204/23/2018 3:08 PMCOBIT-Governance of Enterprise IT 0
Performing Cyberinsurance “CPR”Journal2204/16/2018 3:03 PMRisk Management0
IT Innovation Governance: From International Policy to Company OversightJournal2204/9/2018 3:07 PMCOBIT-Governance of Enterprise IT 1
Working With Access Certification DataJournal2204/2/2018 3:14 PMSecurity0
How, Not WhatJournal2203/26/2018 3:10 PMAudit-Assurance0
Innovating Innovation GovernanceJournal2203/19/2018 8:22 AMCOBIT-Governance of Enterprise IT 0
How to Prioritize Security Controls ImplementationJournal2203/12/2018 3:01 PMSecurity1
First Steps for Automating Your IOC Provision SourcesJournal2203/8/2018 3:03 PMSecurity0
Cryptographically Protecting Databases Against Data BreachesJournal2203/5/2018 3:23 PMSecurity0
Developing a DLP ProgramJournal2202/26/2018 3:17 PMSecurity1
Leveraging Artificial IntelligenceJournal2202/19/2018 3:36 PMRisk Management2
Working With Big DataJournal2202/15/2018 2:18 PMSecurity0
Big Data in OrganizationsJournal2202/12/2018 3:08 PMSecurity0
Updating the COBIT Process Assessment ModelJournal2202/8/2018 3:09 PMCOBIT-Governance of Enterprise IT 0
Putting Machine Learning in PerspectiveJournal2202/5/2018 3:30 PMRisk Management0
Cloudifying Malware: Understanding Cloud App ThreatsJournal2202/1/2018 4:09 PMSecurity0
Auditing Data SecurityJournal2201/29/2018 3:08 PMAudit-Assurance2
Prepare Your Substitutes Journal2201/22/2018 3:14 PMAudit-Assurance0
Evolving Appreciation for Data PrivacyJournal2201/16/2018 3:11 PMPrivacy0
Twelve IoT ControlsJournal22012/28/2017 8:43 AMAudit-Assurance1
Krack Attack—Exploiting Wi-Fi Networks Journal22012/21/2017 3:06 PMSecurity0
A Different Approach to AssuranceJournal22012/19/2017 3:18 PMAudit-Assurance1
Calculating Cloud ROIJournal22012/11/2017 3:08 PMCloud Computing0
My First Mobile DeviceJournal22012/4/2017 9:00 AMAudit-Assurance2
Caught in the Act: Targeting Ransomware on the WireJournal22011/20/2017 3:04 PMSecurity0
The Role of Certifications in the Hiring ProcessJournal22011/13/2017 3:10 PMCertification1
The Risk of Third PartiesJournal22011/6/2017 3:09 PMRisk Management0
Steps to Enforcing Information Governance and Security ProgramsJournal22010/23/2017 3:06 PMSecurity1
The Darkest Moments of a Cybereclipse Are Best Examined Through a Quantitative LensJournal22010/16/2017 3:06 PMRisk Management0
Why Privacy by Design Is a Stride Toward Consumercentric DesignJournal22010/9/2017 3:05 PMPrivacy0
Examining the “Compliant, Yet Breached” PhenomenonJournal22010/2/2017 8:53 AMSecurity2
The Future Looks Promising for Blockchain Technology Journal2209/25/2017 3:14 PMSecurity0
SSH: Why You Need to CareJournal2209/21/2017 3:02 PMSecurity0
Tracking Vulnerability Fixes to ProductionJournal2209/18/2017 1:53 PMSecurity0
Equifax: Too Soon for Lessons Learned?Journal2209/8/2017 2:54 PMSecurity1
Stuck in the Middle With YouJournal2209/5/2017 8:51 AMAudit-Assurance0
ESA: What Is It and How Does it Work?Journal2208/28/2017 3:48 PMSecurity4
Developing an Information Privacy PlanJournal2208/14/2017 3:13 PMPrivacy0
Questions to Ask When Selecting an ITIL Automation ToolJournal2207/24/2017 3:26 PMSecurity0
The Absence of IT Governance CodesJournal2207/17/2017 3:03 PMGovernment-Regulatory3
Obtaining Accurate HTTPS Posture InformationJournal2207/3/2017 8:20 AMSecurity0
Strengthening Risk Management in the Wake of Petya Ransomware OutbreakJournal2206/28/2017 2:17 PMRisk Management2
Using Hackers’ Own Tools Against Them Journal2206/26/2017 3:11 PMSecurity0
Emotional Labor Journal2206/22/2017 3:05 PMAudit-Assurance0
The Key for Evaluating IT Asset, Risk Impact and Control GapJournal2206/19/2017 3:43 PMRisk Management2
Leverage Enterprise Data Management Investments to Facilitate Data Breach Reporting RequirementsJournal2206/5/2017 8:17 AMGovernment-Regulatory0
Securing Connected DevicesJournal2205/15/2017 3:13 PMSecurity0
Holistic View of Addressing IoT Risk by Leveraging a Decomposition StrategyJournal2205/8/2017 3:08 PMRisk Management0
Securing Mobile AppsJournal2205/1/2017 3:40 PM0
Agile Audit PracticeJournal2204/10/2017 3:07 PMAudit-Assurance1
How to Manage Third-party RiskJournal2204/3/2017 8:31 AMRisk Management1
1 - 100 Next