Data Protection Today and What’s Needed Tomorrow

Technology today allows thieves to copy sensitive data, leaving the original in place and thus avoiding detection. Published in October 2012, the Jericho Forum® Data Protection white paper reviews the state of data protection today and where it should be heading to meet tomorrow’s business needs. Continue reading

How the CIO can Sleuth Mobile Systems

Guest Post by David Nardoni The responsibility of conducting mobile forensic investigations in the workplace should fall in the lap of the Chief Information Security Officer (CISO). Unfortunately, 58% of organizations do not have a CISO, according to our recent Global State of Information Security Survey of 9,300 senior executives. Often the CIO is tasked with leading efforts to collect evidence when foul play is suspected. Fetching data from mobile devices is fraught with challenges […]

Survey: Data Breaches Driving Customers Away

Guest post by Mark Lobel According to our new Global State of Information Security Survey 2013, data breaches are driving customers away from businesses around the world. In conjunction with CIO Magazine and CSO Magazine, we recently surveyed 9,300 c-Suite executives, vice presidents and directors of IT & information security from 128 countries. 52% of executives confessed they have lost customers as a result of inadequate information security. I can’t think of a more compelling […]

#ogChat Summary – The Future of BYOD

With over 400 tweets flying back and forth, last week’s BYOD Tweet Jam (#ogChat) saw a fast-paced, lively discussion on the future of the BYOD trend and its implications in the enterprise. In case you missed the conversation, here’s a recap of last w…

Optimizing ISO/IEC 27001 Using O-ISM3

Read more about a recently published Open Group guide titled “Optimizing ISO/IEC 27001 using O-ISM3” that is relevant to organizations using ISO27001/27002 as their Information Security Management System (ISMS). Continue reading →

The Open Group Barcelona Conference – Early Bird Registration ends September 21

Early Bird registration for The Open Group Conference in Barcelona ends September 21. Register now and save! The conference runs October 22-24, 2012. On Monday, October 22, the plenary theme is “Big Data – The Next Frontier in the Enterprise,” an…

Cloud Computing and Security: Do You Know Where Your Data Is?

Migrating more data and applications to the cloud is top of CIO’s to-do list right now. 52% of the 489 business and technology executives who responded to our 2012 Digital IQ study plan to boost their spending in the private cloud this year. Those same firms are simultaneously setting their sights on the public cloud. 57% of the leadership surveyed claim they are ramping up their investments in public clouds. Understandably, security is weighing heavy […]

If you liked this, you might also like:

  1. The Era of Security Breaches
  2. Why Cloud Computing Has Legs
  3. CIO Guide to Cloud Computing

Corporate Data, Supply Chains Remain Vulnerable to Cyber Crime Attacks, Says Open Group Conference Speaker

Joel Brenner, the author of “America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare,” discusses how corporate data and supply chains remain vulnerable to cyber crime attacks in a podcast with Dana Gardner. Mr. B…

BYOD and Your CEO

What’s small, shiny and keeps CIOs up at night? The CEO’s personal devices. CEOs are like every other employee. They love tablets, smart phones and apps. The glaring difference is that the CEO’s personal devices put the company at much greater risk than the gadgets of virtually all other employees combined. CIOs must  include chief executives in conversations as they grapple with putting BYOD security policies and procedures in place. Many CEOs criss-cross the globe […]

If you liked this, you might also like:

  1. How the CIO Can Establish a BYOD Usage Policy
  2. Building a BYOD Ready Infrastructure
  3. What’s the CIOs Role in Compliance?