ciso (8)

8028307088?profile=originalAs the grid modernises, the design of utility cybersecurity solutions need to be rethought to defend against the evolving capabilities of potential attackers. A huge difficulty lies in the selection process of available technologies. This comes with the bigger challenges of implementing and operating these new technologies to harmonise with existing internal utility services. As a result, Smart Grid Forum’s Smart Grid Cybersecurity 2020 conference has been created to solve the strategic, applica

Read more…

In today’s hyper-connected digital age, it’s not unusual for medium to large-sized companies to have hundreds, or even thousands, of third-party suppliers.

This can range from product suppliers, to billing processors, to cloud providers, and a variety of different services.

This large volume of suppliers can pose a challenge for Chief Security Information Officers (CISO) to properly manage risk, especially when personal or confidential data is shared.

A Risky Misconception – Understanding Supplier

Read more…
Not so long ago, the idea of outsourcing critical business functions or IT systems to a third party supplier would have been off limits for many organisations because of the level of risk involved. However today, the use of third party suppliers has increased exponentially, with many organisations outsourcing even core functions of their business. Why? Outsourcing can be financially attractive, efficient and provide competitive advantage.
 
In delegating key processes to third parties, organisatio
Read more…

Going into 2020, businesses are expected to continue the transition from on-premise to cloud.  Many are increasingly adopting a cloud-first strategy, where if possible, they will run their services on a cloud platform vs keeping them in a data center.

And why not? The benefits of moving to the cloud are enormous and the list is long.  They range from – but are not limited to – reduced overheads, improved scalability without the capex costs, and improved efficiencies.  The big one that hangs over

Read more…

Introduction

 

In a conventional security thinking, IT Security at most of the enterprises follow old ‘Industrial Security Model’ where its considered that assets are held within a perimeter and users must enter the perimeter physically or logically (LAN/VPN) to access the assets and the perimeter is guarded by a gatehouse / guard. In other words, this model is called perimeterised computer network where data and applications is attached to the network and is protected by firewalls with access lis

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead