Risk management News
May 24, 2016
Former computer science majors Lieu and Hurd wrote to their U.S. House of Representatives colleagues, urging improved awareness of cyber risks and cyberhygiene.
March 22, 2016
This week, bloggers explore management for Internet of Things risks, layered protocol stacks and TELoIP's SD-WAN offering.
February 16, 2016
Just as companies were getting a handle on mobility, the Internet of Things (IoT) business is officially booming: Gartner Inc. predicts there will be 6.4 billion connected "things" used worldwide in 2016. Connected consumer devices get most of the hype, but companies have been reaping IoT's data analysis benefits to streamline processes and provide increased value to customers. Connected devices raise numerous data management questions, however. As more devices are connected, it will create an unprecedented flow of data that comes with an unprecedented amount of vulnerabilities. To capitalize on IoT's business benefits, companies will have to make big adjustments to GRC strategy. In this handbook, learn why the connected device movement is making companies reexamine data governance, security and compliance processes, and strategies to take full business advantage of IoT data management.
December 11, 2015
This week, software-defined networking bloggers explore Juniper's decoupled QFX5200 switch, the basics of VXLAN and how Cisco's APIC-EM system lets users ease into SDN.
Risk management Get Started
Bring yourself up to speed with our introductory content
Risk management is a company's process for identifying and controlling threats to its assets, including proprietary corporate data, customers' PII and intellectual property. Continue Reading
Strategic planning is the process executives undertake in order to make thoughtful decisions about their organization’s mission, values and goals, and properly allocate resources to fulfill those directives. Continue Reading
OPSEC (operational security) is an analytical process that identifies assets such as sensitive corporate information or trade secrets, and determines the controls required to protect these assets. Continue Reading
Evaluate Risk management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Blockchain's distributed ledger could someday be a useful tool for financial transactions and risk management. Experts say it's not too early for CFOs to get familiar with the basics. Continue Reading
Following ISACA's recent acquisition of the CMMI Institute, expert Judith Myerson takes a closer look at COBIT and CMMI models and how they compare to one another. Continue Reading
Managing and analyzing data in the cloud can reduce IT costs and simplify technology deployments and upgrades. But adoption levels remain relatively low, despite the potential benefits. Continue Reading
Manage Risk management
Learn to apply best practices and optimize your operations.
The Brexit vote caused an enormous shock to the world's financial systems and cost investors a lot of money. But a data-driven strategy and machine learning tools helped some avoid the risks. Continue Reading
Chief data officers are becoming more common in enterprises, but how does the presence of this c-level affect the CISO's role? Expert Mike O. Villegas discusses. Continue Reading
An expert in benchmarking for performance management reveals how process performance is hard to analyze without a dashboard that provides the right context. Continue Reading
Problem Solve Risk management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Machine learning applications are beneficial to enterprises, but there are also several risks involved. Expert Judith Myerson explains five ways to combat them. Continue Reading
One neurosurgeon in upstate New York is working to reduce the risk of complex surgical procedures by using a 3D printer. In doing so, he is also seeing lower costs for surgery. Continue Reading
Information security metrics may be lost on some executives, Curran says. Keep their attention on security measures with the right portfolio. Continue Reading