Expand your knowledge on topics related to digital transformation.
IS Audit Basics: Providing Audit Committee Guidance
It has been largely overshadowed by the EU General Data Protection Regulation (GDPR), but the Directive on Security of Network and Information Systems (NIS Directive) has been transposed into law in many European countries.
The Network: Adam Kohnke
What is the biggest security challenge that will be faced in 2020?
The Practical Aspect: Today’s Interdisciplinary Auditors
The job of auditors has always been interdisciplinary.
Digital Transformation of Taxation
The advancement of technology from analog electronics and mechanical devices to the digital technology available today emerged in the 1980s, when the Third Industrial Revolution was born.
Enhancing the Board’s Readiness for Digital Transformation Governance
Shortcomings in IT governance and in the skills and competencies of boards to provide the requisite direction for digital transformation (DX) mean that boards in general are ill-equipped for DX oversight and for the nature of the decisions required to effectively achieve it.
Sustainable Development for Digital Transformation, Part 1
Digital business models expand the types and numbers of an organization’s identities.
The Need for a Digital Security Architecture
IT and security professionals tend to have a high degree of focus on tools and technology.
Value Creation Through Effective Data Strategy
It is often said that data are the new oil.
Call for Supply Chain Security
Awareness of the risk to enterprise information assets through the supply chain surged after the 2013 Target Corp. data breach.
Factors Influencing the Adoption of Cybersecurity Situational Awareness Programs
The rapid and sustainable advancement of the IT environment has improved domestic and industrial operations and connectivity.
Sustainable Development for Digital Transformation, Part 2
Increasingly, organizations connect their on-premises infrastructures to cloud-based technologies, both from a Software-as-a-Service (SaaS) and an overarching infrastructure perspective.
Occupational fraud, e.g., internal theft, employee fraud and asset misappropriation, plagues enterprises of all sizes.
The Human Factor in Information Security
Humans represent a mystery to be deciphered by security/cybersecurity experts because their behaviors, attitudes, beliefs, rituals and decisions (the general characteristics that define a culture) constitute a little-understood universe for executives and their heads of security.
Accountability for Information Security Roles and Responsibilities, Part 1
In recent years, information security has evolved from its traditional orientation, focused mainly on technology, to become part of the organization’s strategic alignment, enhancing the need for an aligned business/information security policy.
Ensuring Vendor Compliance and Third-Party Risk Mitigation
Implementing the EU General Data Protection Regulation (GDPR) is a significant challenge for most enterprises because it requires many to completely change their perception of personal data security.
A speaker at a conference I recently attended stated that “Organizations must adopt digital transformation to stay ahead in business.”