Security by Design: Are clients or members adequately surveyed to obtain perception of your organization?

While you want to leverage technology to improve your services and provide more to your organization, you must carefully weigh the risks and recognize whether you truly have the right skills, there is a potential demand for model-driven software tools processing security patterns automatically to support designers, developers, and auditors. Read more…

Cyber Security: What value would you place on each types of technology being employed in Security Operations Centres (SOC)?

Similar to financial and reputational risk, cyber security risk affects your organization bottom line, internal controls are the policies and procedures that a business puts into place in order to protect its assets, ensure its accounting data is correct, maximize the efficiency of its operation and promote an atmosphere of Read more…