security (283)

security_risk_management.jpgA study published last week sponsored by Tripwire and conducted by the Ponemon Institute found that while over 80% of security and risk professionals consider their organization's commitment to risk-based security management significant, less than 30% had a formal risk management strategy in place.

Why does such a large gap continue to exist, even as the evidence piles up that organizations with a mature risk framework are better performing and more prepared for an uncertain future?

One hurdle tha

Read more…

TSA adopts Enterprise Risk Management

Risk management is not about absolutes, it is about using a consistent analysis framework for balancing risk and cost on a common basis across the enterprise. Yesterday's announcement by the Transportation Security Administration (TSA) of their adoption of a risk-based approach is a long awaited practical application of enterprise risk management to security.security-risk-assessment-206x300.png?width=206

As April 25, 2013, the TSA will allow small pocketknives and an array of sporting equipment -- banned from aircraft cabins in the wake of t

Read more…

Social Media for Security and Risk Management Professionals

Everything you NEED to know

[Webinar]

social_bomb-300x225.png?width=400

Click Here

Social media is a growing influence on businesses and executive management.

Do you know they key issues affecting your business and how social media plays a role? 

This webinar is aimed at security and risk managers to help them quickly understand the issues, concerns and opportunities that social media presents.

The session will cover:

  • What social media really is for businesses
  • The big ones to be
Read more…

70 Travel Risk Management Safety and Security Tips [Video]

Travel-Risk-Management-Safety-and-Security-Tips.Image_.Tony-Ridley.95.png?width=400

All travel should be considered hazardous, until proven otherwise. This 70 travel risk management video set provides professional tips and advice on how to manage the threats and hazards of travel.

Ranging from the administrative processes to extreme events such as natural disasters each video is a short 2-5 minute education tutorial that will assist in reducing the risk of travel, anywhere you travel.

You will receive a unique, informative

Read more…

Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core - their databases. Many don't have a comprehensive database security strategy to defend against sophisticated attacks, track sensitive data, or even meet emerging regulatory requirements.

In addition, organizations tend to focus on detective controls rather than preventive measures when it comes to database security.

By contrast, Forrester finds that by implementing a c

Read more…

This white paper explores data loss from a contrarian point of view - exploring the top 7 shortcuts you can take to ensure that you lose your data. And since a fundamental responsibility of any information technology professional, as well as any C-level executive, is to ensure that the data upon which any company is created is protected - scrupulously following these shortcuts should also ensure that you lose not only your data but your job as well.

===> http://bit.ly/LosingData

 

Read more…

Dear  GlobalRisk Community member/website visitor,
You recently downloaded a white paper from our website related to IT Security and cloud computing. Today we would like to offer you some great additional resources. 

1. Navigating the Enterprise Software Minefield - 10 Critical Factors to Ensure Success

This paper will first outline the challenges of ERP selection and implementation and then offer practical advice and critical success factors to make sure your ERP process is smooth and effective

Read more…

nigel salt blogs

All my historic blogs are at http://nigeles.blogspot.com/ - the original blog site covers three main areas of interest namely, public sector IT governance and security, treatment of depression and insomnia and the provision for the disabled in the UK which relates to my daughter's need for managed independent living.

Those blog entries with a more "work" flavour are also on wordpress http://nigelyahoo.wordpress.com/

Most of my comments to date on IT governance, cloud computing and IT security are

Read more…

Providing a holistic overview on the widespread private use by employees and how many businesses embraced social media in their communications

Examining current social media compliance policies with case studies

Potential security risks, phishing scams, malware attacks,

Protection of (fair use of) intellectual property: The need to address the protection of intellectual property in policies and procedures of the proper business use of social media

Analysing the regulatory requirements on the use

Read more…

This book provides a practical set of detailed steps to implement an Information Governance program, as well as the associated automation.

IBM has assembled a comprehensive approach to Information Governance that delivers the industry's strongest portfolio of products, services, and best practices to address every organization's needs.

 

====> http://bit.ly/DataGovernanceEBook

 

Read more…
According to a 2011 McAfee report on second quarter threats, there were 12 million unique samples of malware for the first half of the year, up 22 percent over 2010, making 2011 the busiest six months in malware history.
As smartphones are used increasingly for mobile payments, and mobile betting, mobile crime exposes mobile operators to business risks from unauthorized account access, fraud, and financial crime.
“Smartphones are an attractive target for criminals as “there is a lot of money invol
Read more…

2011 Web Security Report

This security report examines Web behavior and the malware to which users are most frequently exposed. Analyzing Web requests from the Blue Coat WebPulse service, which weekly rates nearly three billion requests in real-time, this report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.

 

The 2011 Web-based threat landscape continues to become more sophisticated, utilizing a combination of techniques

Read more…

Recently organizations have been faced with the increasing threat of cyber attacks, whether from external hackers such as lulzsec or from internal attacks such as wikileaks.  Your customers' personally identifiable information, organization's intellectual property, and confidential files are all vulnerable to attack.

How prepared is your IT Risk Management? How vulnerable is your organization to a cyber-attack?  What would the consequences of a cyber-attack be on your organization? Your board nee

Read more…

Introduction

 

The death of Osama Bin Laden does not conclude the global threat of terrorism but in many instances it will trigger a new wave or business travel threats. If you want to know more on how the killing of Osama Bin Laden will affect business travel then you need to read this article. This article will identify the major delays, disruptions, risks and threats to business travel as a result of this high profile leader’s death. By the end of the article you will know the key issues affect

Read more…

Managing Business Travel Risks and Crisis

Introduction

If you know that business travel is not without its risk and the potential for crisis, then you need to read this article.build_puzzle_bridge_pc_400_clr-300x182.png?width=300


In this article we are going to talk about the management and containment of crisis as it relates to travellers and travel managers.
The objective of this article is to share with you the collective knowledge on managing crisis and significantly improve your ability to identify and manage a crisis but also improve your busin

Read more…

The Golden Hour and the First 24 Hours!

In the vast majority of cases, regardless of the duration, the end success or successful resolution to a crisis is determined by the initial actions in the first 24 hours. Often referred to as the “Golden Hour” in emergency medicine, the initial hour of the first 24 hours is the foundation upon which the primary phase is predicated. The events, information and decision making process during these two phases will place both individuals and multi national cor

Read more…

Security Risks of Web 2.0

Introduction

Let’s start with what’s Web 2.0 before getting in to the risks.

The term Web 2.0 is commonly associated with web applications that facilitate interactive information sharing, interoperability, user-centered design and collaboration on the World Wide Web.

For some of you still not clear of what’s Web 2.0 let me put it down in a different way. Web 2.0 is Facebook or MySpace or Linkedin or Twitter or the blogs or the Wikis or any web site which allows the visitor to interact by posting up

Read more…

Are you wondering “How safe is it to travel to Thailand in 2011?“. So are many others. Find out here what the main travel safety and security issues will be for Thailand in 2011. You may be surprised as to what the REALthreats and issues are.

 

Thailand Travel Safety and Security Report

 

 

Remove the guess work or hesitation when considering travel to Thailand

  • No more fear and exaggerated reporting
  • No more waiting for the main news broadcasts
  • No more worried or confused managers and travellers
  • No more c
Read more…

Call For Papers

Information & Security: An International Journal

Special issue on

Countering Maritime Piracy

Editor: Prof. Alexander Yankov
Judge, International Tribunal for the Law of the Sea

 

{Keywords: piracy, situational awareness, maritime sovereignty, maritime safety, security or maritime transport, emerging security challenges, transport infrastructure, harbor protection, risk analysis, terrorism, counterterrorism, threats, risks, vulnerability, risk assessment, risk mitigation, risk management, Critical Infr

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead