Premium Content

Access "Cybersecurity and global risk assessment enter the boardroom"

Kathleen Richards, Features Editor Published: 29 Aug 2013

"We need to advance the security agenda to the boardroom," said MacDonnell Ulsch, CEO and chief analyst of ZeroPoint Risk Research. That means turning to managing risk, according to Ulsch. "I know there are those who disagree with this, and who believe that technical security is the answer. To me, it is only part of the solution of managing risk. "It is interesting, too, that so many in the industry are focusing on data protection of regulated data, but that intellectual property [IP] and trade secrets seem less critical, even though these secrets may be the lifeblood of the company," added Ulsch. "If I lose PII and PHI, it's a bad day, and there are consequences. If I lose IP, it may be the end of the company. So managing risk is what security professionals are doing. They know it, now we need the rest of the organization to know it." Ulsch, who joined the Information Security magazine editorial advisory board last month, is among the experts who shared tips and strategies in my article on global risk assessment and security. Analysts at Gartner, and ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Firewalls play by new rules by David Strom, Contributor

      Modern firewalls offer greater application awareness and user controls. Protect your migration strategy with these tips from the pros.

    • Bridging the IT security skills gap by Robert Lemos

      While poaching security talent may plug short-term gaps, outreach and education will solve the long-term shortfall in IT security professionals.

More Premium Content Accessible For Free

  • Devising a security strategy for the modern network
    countering_cybercrime.png
    E-Handbook

    The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...

  • The big data challenge: What's in store for NoSQL security
    security_0814.jpg
    E-Zine

    In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...

  • A comprehensive guide to securing the Internet of Things
    ISM_IE_0814.png
    E-Zine

    As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...