100% Cyber Secure Are you kidding? Yes, there is. These computers are 100% secure from cyber-attack, but ... What about physical threat? Are Control #3 Controls are necessary to reduce likelihood of risks. But excessive controls shall have adverse effects: Degrade productivity Push back from Privacy We all know the importance of privacy and the need to protect it. While protecting privacy, we need to look Shadow IT Gartner defines Shadow IT as IT devices, software and services outside the ownership or control of (IT) organizations. Given that information The Good, The Great As cybersecurity practitioner, you might need to assist asset owner or end user to deal with auditor (or security assessor). Vulnerability Management This is always a debating topic during audit or security assessment. Auditor: your control system lacks of the latest security The Forgotten Place #4 Continuation of this. The Forgotten Place #3 Continuation of this. The Forgotten Place #2 Continuation of this. The Forgotten Place Most of the time, tight technical controls are deployed at infrastructure, network, platform, application or end points to address cybersecurity. Scale of Impact The illustrations are self-explanatory - priority will be given to protect or rectify the higher impact scenario. The hard part Cybersecurity Transformation To be successful in cybersecurity transformation, each one in the organization shall contribute as the baseline. Culture or politic in « Previous 1 … 17 18 19 20 21 22 Next »