Create a Team for Audit Analytics? Part 3

In the previous post, Create a Team for Audit Analytics? Part 2, I explored the pros and cons of expecting all auditors to develop a level of data and analytic proficiency. These auditors would continue to do audit testing that involves … Co… Continue reading Create a Team for Audit Analytics? Part 3

5 Things We Need from ACL in 2018

Here’s the 5 things I’m hoping will change in 2018 regarding ACL. They are all related to each other and feed off each other… Interesting. One) The ACL Analytics user interface (UI) finds a good plastic surgeon. While I have crit… Continue reading 5 Things We Need from ACL in 2018

How Management Can Help Prevent Insider-Caused Data Breaches

In 2017, some of the world’s most devastating cyber attacks were seen. Insider threats continue to be the primary reason for such high profile data breaches year over year. With the rise of malware as a service, insiders are now more than capable… Continue reading How Management Can Help Prevent Insider-Caused Data Breaches

How Management Can Help Prevent Insider-Caused Data Breaches

In 2017, some of the world’s most devastating cyber attacks were seen. Insider threats continue to be the primary reason for such high profile data breaches year over year. With the rise of malware as a service, insiders are now more than capable… Continue reading How Management Can Help Prevent Insider-Caused Data Breaches

How Information Security Can Drive Innovation

Information Security and Innovation: often at two different ends of an executive team’s business strategy. The non-CIO ‘C’ level folks want to discuss revenue generation, efficiency and growth. Three areas often immeasurably enhanced … Continue reading How Information Security Can Drive Innovation

IIA Analytics Article Dead Wrong

A recent IIA article on building an analytics function in internal audit is dead wrong. At least on one major point, anyway. And it’s a big one. As the tombstone reads, this point is D.O.A (dead on arrival, or more … Continue reading &#8594… Continue reading IIA Analytics Article Dead Wrong

Lightboard Lessons: What is BIG-IQ?

In this Lightboard Lesson, I light up many of the tasks you can do with BIG-IQ, BIG-IQ centralizes management, licensing, monitoring, and analytics for your dispersed BIG-IP infrastructure. If you have more than a few F5 BIG-IP’s within your organization, managing devices as separate entities will become an administrative bottleneck and slow application deployments.  Deploying […] Continue reading Lightboard Lessons: What is BIG-IQ?

IT/Dev Connections 2017: Focusing on Windows 10 Deployment Challenges with Johan Arwidmark

Is it time to take a closer look at your current or upcoming deployment plans for Windows 10? These sessions at ITDC 2017 will give you all the resources you need no matter where you are at in the process.

read more Continue reading IT/Dev Connections 2017: Focusing on Windows 10 Deployment Challenges with Johan Arwidmark

Countdown List: 5 Tips to get the Most from Your Penetration Testers

All CISOs know at least one story of a penetration test that went wrong. And many of them can share stories of penetration tests that went deeply wrong. For this reason, it is a worthwhile exercise to take account of best practices in managing such engagements. This is important for modern enterprise security teams given […]… Read More

The post Countdown List: 5 Tips to get the Most from Your Penetration Testers appeared first on The State of Security.

Continue reading Countdown List: 5 Tips to get the Most from Your Penetration Testers