Having introduced this blog series and covered information risks applicable to the preliminary and operational phases of a professional services...
Data and computer security
Data and computer security
Following-on from the preliminary phase I covered yesterday, the longest phase of most professional services engagements is the part where...
I finally found the time today to complete and publish an information security policy template on threat intelligence. The policy supports...
Following-on from the preliminary phase I covered yesterday, the longest phase of most professional services engagements is the part where...
Having introduced this blog series and covered information risks applicable to the preliminary and operational phases of a professional services...
"Risk management procedures are fundamental processes to prepare organisations for a future cybersecurity attack, to evaluate products and services for...
Following-on from the preliminary phase I covered yesterday, the longest phase of most professional services engagements is the part where...
Yesterday I proposed a guideline on the information risk, security and privacy aspects of professional services. I introduced a simplistic...
Following-on from the preliminary phase I covered yesterday, the longest phase of most professional services engagements is the part where...
"Risk management procedures are fundamental processes to prepare organisations for a future cybersecurity attack, to evaluate products and services for...