Did I get the real requirements from the real key stakeholders? Some tips to share
Cyber Certification program, tailored for end-user environment across all business sectors.
To achieve business robustness and resilience, Get a free demo of “IT Governance Control Framework”
Almost every company interacts with a third-party on a daily basis. If the party has access to a company’s intellectual property or network along the value chain, a risk is imposed that needs to be recognized and managed.
What comes between between human psychology and information security or compliance?
Cyber criminals have not given any surprises in January 2017. Ransomware attacks continue
A new reference architecture that illustrates how to leverage social collaboration tools to harness ideas, exchange information, and increase the speed of innovation across the business
There is a tight link between a successful ISMS implementation project and penetration testing.
Tune in to IT Governance Executive Chairman's speech about The Future of the GDPR and NIS Directive