AI or GDPR?Journal22011/4/2019 4:12 PMGovernment-Regulatory0
The Role of Data Strategy in Optimizing Organizational ProcessesJournal22010/31/2019 3:29 PMRisk Management0
Cybersustainability: Ensuring Digital Strategies That Protect DataJournal22010/8/2019 8:52 AMSecurity1
I Know What I Know (If You Know What I Mean)Journal2209/23/2019 4:56 PMAudit-Assurance1
How to Prepare for Taxation in a Digitalized EconomyJournal2209/9/2019 3:02 PMAudit-Assurance2
Digital Transformation Oversight Extends Beyond TechnologyJournal2209/3/2019 3:01 PMCOBIT-Governance of Enterprise IT 0
Auditing Green ITJournal2208/29/2019 2:56 PMAudit-Assurance0
Ethics in IT: An Emerging Frontier in the Enterprise Governance of ITJournal2208/26/2019 2:57 PMCOBIT-Governance of Enterprise IT 0
Learning to Secure AIJournal2208/22/2019 3:00 PMSecurity0
The Role of Ethics in Risk ManagementJournal2208/19/2019 4:28 PMRisk Management0
Applying Chaos Theory to SecurityJournal2208/12/2019 2:59 PMSecurity0
Measuring Risk QuantitativelyJournal2208/5/2019 3:03 PMRisk Management2
Where to Begin Addressing the Policy-to-Execution GapJournal2208/1/2019 3:04 PMSecurity0
Addressing the Vulnerabilities of IoT DevicesJournal2207/29/2019 3:00 PMSecurity0
The Need for SpeedJournal2207/22/2019 3:01 PMCOBIT-Governance of Enterprise IT 1
Defining the ROI of AutomationJournal2207/15/2019 2:57 PMAudit-Assurance1
Practically Implementing DevSecOpsJournal2207/11/2019 2:45 PMSecurity1
Coincidence or History?Journal2207/1/2019 3:12 PMAudit-Assurance0
Patch Management PracticeJournal2206/17/2019 3:11 PMSecurity2
Three Steps to Begin Transforming Your Cybersecurity ProgramJournal2206/13/2019 3:03 PMSecurity2
Increasing Your Organizaton’s CybermaturityJournal2206/10/2019 2:57 PMSecurity0
Innovation Is About PeopleJournal2206/3/2019 3:37 PMCOBIT-Governance of Enterprise IT 0
The Role of Culture on IT GovernanceJournal2205/30/2019 3:05 PMCOBIT-Governance of Enterprise IT 0
Sharpening the AxeJournal2205/28/2019 3:04 PMAudit-Assurance0
The Role of Incident Management in Identifying Gaps During Stabilization PeriodJournal2205/20/2019 3:06 PMRisk Management0
The Importance of CyberresiliencyJournal2205/6/2019 3:34 PMSecurity0
Building an Audit Program for AWSJournal2204/29/2019 3:06 PMAudit-Assurance0
The Impact of the Thailand Cybersecurity LawJournal2204/22/2019 3:03 PMSecurity1
Simplifying Enterprise Risk AnalysisJournal2204/8/2019 3:12 PMRisk Management0
Proactively Embracing InnovationJournal2204/1/2019 2:58 PMAudit-Assurance0
Defining the Role of the CISO Journal2203/28/2019 2:59 PMSecurity0
Cybersecurity Auditing SkillsJournal2203/25/2019 3:00 PMSecurity0
How to Ensure Data Privacy and Protection Through Ecosystem IntegrationJournal2202/25/2019 2:46 PMPrivacy1
Getting Your GDPR Compliance Program Into Gear With Proper Record KeepingJournal2202/18/2019 3:08 PMGovernment-Regulatory0
More on Password DictionariesJournal2202/14/2019 3:02 PMSecurity1
For the Board, GDPR Compliance Implementation Reporting Is More Than Just About Exposure and ProgressJournal2202/11/2019 3:13 PMGovernment-Regulatory0
Practical DLP ImplementationJournal2201/28/2019 3:09 PMGovernment-Regulatory0
Auditing the GDPRJournal2201/22/2019 2:47 PMAudit-Assurance0
What Are Challenges in Deployment and How Can They Be Mitigated?Journal2201/3/2019 2:57 PMRisk Management0
Bound to HappenJournal22012/17/2018 3:03 PMSecurity0
The New Normal: The Learning OrganizationJournal22012/3/2018 3:07 PMSecurity1
A Healthy Way to Think of MetricsJournal22011/26/2018 3:01 PMSecurity3
Optimism and the Audit ProfessionJournal22011/19/2018 3:05 PMAudit-Assurance0
Leveraging Employee Resource Groups to Build Diverse IT Audit TeamsJournal22011/12/2018 3:13 PMAudit-Assurance1
A Career in Artificial IntelligenceJournal22011/8/2018 3:07 PMSecurity3
Board Involvement in Digital Strategy and OversightJournal22010/15/2018 3:03 PMCOBIT-Governance of Enterprise IT 2
The Potential Impacts of Blockchain on the Auditing ProfessionJournal22010/8/2018 2:51 PMAudit-Assurance1
If Digital Transformation Is Hard, Your Board May Be Lacking Key Skills and ExperiencesJournal22010/1/2018 11:00 AMCOBIT-Governance of Enterprise IT 4
Privileged Access Management and Implementing It Smartly Journal2209/24/2018 3:10 PMSecurity1
The Growing Scope of the IoTJournal2209/17/2018 3:07 PMAudit-Assurance0
Adding Audit ValueJournal2209/10/2018 3:02 PMAudit-Assurance0
How to Implement MFT for Data ProtectionJournal2209/4/2018 3:18 PMGovernment-Regulatory4
Decision Analysis of Ransomware Incidents Journal2208/30/2018 3:31 PMSecurity1
Key Steps in a Risk Management Metrics ProgramJournal2208/27/2018 2:50 PMRisk Management3
The Benefits and Risk of Blockchain TechnologyJournal2208/20/2018 3:11 PMRisk Management0
Knowing What to ProtectJournal2208/16/2018 2:38 PMSecurity1
SWIFT Infrastructure Needs to Be Secured in a Structured MannerJournal2208/13/2018 2:47 PMSecurity0
Love Them or Loathe Them, Good IT Business Cases Are of Inestimable Value to Good IT Portfolio ManagersJournal2208/6/2018 3:16 PMRisk Management0
Managing Technology Innovation EfficacyJournal2208/2/2018 3:06 PMCOBIT-Governance of Enterprise IT 0
Privacy Matters MatterJournal2207/26/2018 3:05 PMPrivacy0
Skills You Will Not Find on a ResumeJournal2206/25/2018 3:08 PMAudit-Assurance1
The Assessment Will Help Your Organization Tackle Any Security ObstacleJournal2206/18/2018 3:03 PMSecurity0
Formalizing the Cybersecurity Role in MDMJournal2206/11/2018 3:08 PMSecurity0
Understanding the Threat LandscapeJournal2206/4/2018 3:06 PMSecurity0
Establishing a Triumvirate—Understanding the Interests for Enhancing Collaboration Between the CISO, the CIO and the CROJournal2205/21/2018 4:00 PMSecurity0
Leveraging SOC Use CasesJournal2205/17/2018 3:17 PMSecurity0
How Blockchain Technology Will Revolutionize the Global Workforce and Education SystemJournal2205/7/2018 3:03 PM0
Security of CurrenciesJournal2204/23/2018 3:08 PMCOBIT-Governance of Enterprise IT 0
Performing Cyberinsurance “CPR”Journal2204/16/2018 3:03 PMRisk Management0
IT Innovation Governance: From International Policy to Company OversightJournal2204/9/2018 3:07 PMCOBIT-Governance of Enterprise IT 1
Working With Access Certification DataJournal2204/2/2018 3:14 PMSecurity0
How, Not WhatJournal2203/26/2018 3:10 PMAudit-Assurance0
Innovating Innovation GovernanceJournal2203/19/2018 8:22 AMCOBIT-Governance of Enterprise IT 0
How to Prioritize Security Controls ImplementationJournal2203/12/2018 3:01 PMSecurity1
First Steps for Automating Your IOC Provision SourcesJournal2203/8/2018 3:03 PMSecurity0
Cryptographically Protecting Databases Against Data BreachesJournal2203/5/2018 3:23 PMSecurity0
Developing a DLP ProgramJournal2202/26/2018 3:17 PMSecurity1
Leveraging Artificial IntelligenceJournal2202/19/2018 3:36 PMRisk Management2
Working With Big DataJournal2202/15/2018 2:18 PMSecurity0
Big Data in OrganizationsJournal2202/12/2018 3:08 PMSecurity0
Updating the COBIT Process Assessment ModelJournal2202/8/2018 3:09 PMCOBIT-Governance of Enterprise IT 0
Putting Machine Learning in PerspectiveJournal2202/5/2018 3:30 PMRisk Management0
Cloudifying Malware: Understanding Cloud App ThreatsJournal2202/1/2018 4:09 PMSecurity0
Auditing Data SecurityJournal2201/29/2018 3:08 PMAudit-Assurance2
Prepare Your Substitutes Journal2201/22/2018 3:14 PMAudit-Assurance0
Evolving Appreciation for Data PrivacyJournal2201/16/2018 3:11 PMPrivacy0
Twelve IoT ControlsJournal22012/28/2017 8:43 AMAudit-Assurance1
Krack Attack—Exploiting Wi-Fi Networks Journal22012/21/2017 3:06 PMSecurity0
A Different Approach to AssuranceJournal22012/19/2017 3:18 PMAudit-Assurance1
Calculating Cloud ROIJournal22012/11/2017 3:08 PMCloud Computing0
My First Mobile DeviceJournal22012/4/2017 9:00 AMAudit-Assurance2
Caught in the Act: Targeting Ransomware on the WireJournal22011/20/2017 3:04 PMSecurity0
The Role of Certifications in the Hiring ProcessJournal22011/13/2017 3:10 PMCertification1
The Risk of Third PartiesJournal22011/6/2017 3:09 PMRisk Management0
Steps to Enforcing Information Governance and Security ProgramsJournal22010/23/2017 3:06 PMSecurity1
The Darkest Moments of a Cybereclipse Are Best Examined Through a Quantitative LensJournal22010/16/2017 3:06 PMRisk Management0
Why Privacy by Design Is a Stride Toward Consumercentric DesignJournal22010/9/2017 3:05 PMPrivacy0
Examining the “Compliant, Yet Breached” PhenomenonJournal22010/2/2017 8:53 AMSecurity2
The Future Looks Promising for Blockchain Technology Journal2209/25/2017 3:14 PMSecurity0
SSH: Why You Need to CareJournal2209/21/2017 3:02 PMSecurity0
1 - 100 Next