Information Technology

IT Risk Management: KRI Basics

IT Risk Management: KRI Basics

As an IT professional, you bear the responsibility of safeguarding your organisation before potential IT risks halt business operations, cause...

CISO Board Presentation Tips

CISO Board Presentation Tips

Effectively communicate your cybersecurity posture to the board with our tips for CISOs on presentations and strategy. Your CISO board presentations...

CISOs In The Boardroom

CISOs In The Boardroom

The role of CISO has been redefined, from one that reacts to data breaches and threats to a position of strategic importance with complex...

How a Robust IT Compliance Program Can Help You Streamline, Save and Grow

How a Robust IT Compliance Program Can Help You Streamline, Save and Grow

Running an adequate IT security and privacy program requires teams to keep track of many details. Where and when does the software need to be updated and patched? What data is the organisation collecting from its customers, and how is this information being protected? Which employees have completed cybersecurity training, and when must curricula be updated? The list goes on.

Thanks to increasingly complex threat environments and company IT footprints, this checklist is getting more extensive and challenging to keep up with daily. Moreover, investors and regulators want proof of a company’s cybersecurity and privacy credentials, often in great detail.