Access "New partnerships, creative thinking help security bust recession"
This article is part of the June 2009 issue of Effective strategies for risk management and security information management systems
Believe it or not, there is a silver lining to the recession. It forces organizations to think creatively about problems, use tools for tasks beyond their intended purpose, and foster relationships they may not have had in the past. There are two such examples of this in this month's issue. The first example in "A Sustainable Relationship" by Michael Mimoso centers on the integration of physical and logical security. While the benefits have been talked about for years, culture clashes and ownership issues have limited its widespread adoption. But in a world of cost cutting and increased scrutiny on ROI, some organizations are bringing the two groups together successfully. It is worthy to note that physical and logical security people have the same concerns: protecting assets, ferreting out malicious insiders and managing risk. What's more, their worlds are colliding as much of the physical security infrastructure has become IP-based. Desperation is a powerful tool. It can actually force people to look beyond preconceived notions and topple established silos.... Access >>>
Premium Content for Free.
How to write a risk methodology that blends business, security needs
One security professional describes a homegrown risk methodology currently being used by a large university and a private corporation.
Lack of cloud computing definition adds confusion, risk
Vendors loosely using the term cloud computing are causing confusion for users in the market for buying and securing these services.
- How to write a risk methodology that blends business, security needs
Risk management must include physical-logical security convergence
If your organization is serious about managing risk and total asset protection, then physical-logical convergence is a necessary step.
Mature SIMs do more than log aggregation and correlation
They've come a long way from the early days of log aggregation and correlation; enterprises now glean value from SIMs for compliance, visualization, and even overall business intelligence.
- Risk management must include physical-logical security convergence
Three cloud computing risks to consider
Cloud computing carries risks that enterprises need to weigh before they forge ahead.
New partnerships, creative thinking help security bust recession
The economy is forcing organizations to be more resourceful and bury the hatchet. And that's a good thing.
- Three cloud computing risks to consider
More Premium Content Accessible For Free
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...