security (276)

Dear  GlobalRisk Community member/website visitor,
You recently downloaded a white paper from our website related to IT Security and cloud computing. Today we would like to offer you some great additional resources. 

1. Navigating the Enterprise Software Minefield - 10 Critical Factors to Ensure Success

This paper will first outline the challenges of ERP selection and implementation and then offer practical advice and critical success factors to make sure your ERP process is smooth and effective

Read more…

nigel salt blogs

All my historic blogs are at - the original blog site covers three main areas of interest namely, public sector IT governance and security, treatment of depression and insomnia and the provision for the disabled in the UK which relates to my daughter's need for managed independent living.

Those blog entries with a more "work" flavour are also on wordpress

Most of my comments to date on IT governance, cloud computing and IT security are

Read more…

Providing a holistic overview on the widespread private use by employees and how many businesses embraced social media in their communications

Examining current social media compliance policies with case studies

Potential security risks, phishing scams, malware attacks,

Protection of (fair use of) intellectual property: The need to address the protection of intellectual property in policies and procedures of the proper business use of social media

Analysing the regulatory requirements on the use

Read more…

This book provides a practical set of detailed steps to implement an Information Governance program, as well as the associated automation.

IBM has assembled a comprehensive approach to Information Governance that delivers the industry's strongest portfolio of products, services, and best practices to address every organization's needs.




Read more…
According to a 2011 McAfee report on second quarter threats, there were 12 million unique samples of malware for the first half of the year, up 22 percent over 2010, making 2011 the busiest six months in malware history.
As smartphones are used increasingly for mobile payments, and mobile betting, mobile crime exposes mobile operators to business risks from unauthorized account access, fraud, and financial crime.
“Smartphones are an attractive target for criminals as “there is a lot of money invol
Read more…

2011 Web Security Report

This security report examines Web behavior and the malware to which users are most frequently exposed. Analyzing Web requests from the Blue Coat WebPulse service, which weekly rates nearly three billion requests in real-time, this report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.


The 2011 Web-based threat landscape continues to become more sophisticated, utilizing a combination of techniques

Read more…

Recently organizations have been faced with the increasing threat of cyber attacks, whether from external hackers such as lulzsec or from internal attacks such as wikileaks.  Your customers' personally identifiable information, organization's intellectual property, and confidential files are all vulnerable to attack.

How prepared is your IT Risk Management? How vulnerable is your organization to a cyber-attack?  What would the consequences of a cyber-attack be on your organization? Your board nee

Read more…



The death of Osama Bin Laden does not conclude the global threat of terrorism but in many instances it will trigger a new wave or business travel threats. If you want to know more on how the killing of Osama Bin Laden will affect business travel then you need to read this article. This article will identify the major delays, disruptions, risks and threats to business travel as a result of this high profile leader’s death. By the end of the article you will know the key issues affect

Read more…

Managing Business Travel Risks and Crisis


If you know that business travel is not without its risk and the potential for crisis, then you need to read this article.build_puzzle_bridge_pc_400_clr-300x182.png?width=300

In this article we are going to talk about the management and containment of crisis as it relates to travellers and travel managers.
The objective of this article is to share with you the collective knowledge on managing crisis and significantly improve your ability to identify and manage a crisis but also improve your busin

Read more…

The Golden Hour and the First 24 Hours!

In the vast majority of cases, regardless of the duration, the end success or successful resolution to a crisis is determined by the initial actions in the first 24 hours. Often referred to as the “Golden Hour” in emergency medicine, the initial hour of the first 24 hours is the foundation upon which the primary phase is predicated. The events, information and decision making process during these two phases will place both individuals and multi national cor

Read more…

Security Risks of Web 2.0


Let’s start with what’s Web 2.0 before getting in to the risks.

The term Web 2.0 is commonly associated with web applications that facilitate interactive information sharing, interoperability, user-centered design and collaboration on the World Wide Web.

For some of you still not clear of what’s Web 2.0 let me put it down in a different way. Web 2.0 is Facebook or MySpace or Linkedin or Twitter or the blogs or the Wikis or any web site which allows the visitor to interact by posting up

Read more…

Are you wondering “How safe is it to travel to Thailand in 2011?“. So are many others. Find out here what the main travel safety and security issues will be for Thailand in 2011. You may be surprised as to what the REALthreats and issues are.


Thailand Travel Safety and Security Report



Remove the guess work or hesitation when considering travel to Thailand

  • No more fear and exaggerated reporting
  • No more waiting for the main news broadcasts
  • No more worried or confused managers and travellers
  • No more c
Read more…

Call For Papers

Information & Security: An International Journal

Special issue on

Countering Maritime Piracy

Editor: Prof. Alexander Yankov
Judge, International Tribunal for the Law of the Sea


{Keywords: piracy, situational awareness, maritime sovereignty, maritime safety, security or maritime transport, emerging security challenges, transport infrastructure, harbor protection, risk analysis, terrorism, counterterrorism, threats, risks, vulnerability, risk assessment, risk mitigation, risk management, Critical Infr

Read more…

"Travel Alert-Travel Safe"

Click link below for information/access:

Travel Alert-Travel Safe: 2011 Business Travel Threats

2010 was an eventful year for business travellers with new and varied events that caused delay, disruption and life safety concerns.

Join our global travel safety and security expert as he discusses:


  • Key travel threats for 2011
  • Industry and company trends
  • Tips for the year ahead
  • Questions from attendees


"Travel Alert-Travel Safe"

Click link below for information/access:

Travel Alert-T

Read more…

If you do a Google search on ‘Cloud Computing Security’ you will get about 13,600,000 results and that’s too much of information for anyone to start. So let’s try to summarize the information keeping in mind of CSO’s concerns on cloud computing.

What is Cloud Computing?

In simple words, ‘Cloud Computing' is a collection of Internet or private-network based services, providing users and devices with scalable & economical (pay-as-you-go) information technology capabilities. The services offered by t

Read more…

Bad weather or even natural calamities do not affect every city in the world nor every resident of the affected area. Accidents, an inevitable part of some environments, do not affect all your people or totally devalue all your assets. Terrorist do not consider everyone a viable target nor are their actions likely to impact everyone over the course of their lives. The facts remain that only a small percentage of events or incidents resulting in loss of value or productivity will affect your busi

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!