Category: Feature

How To Find The Right Data Owners

One of the most frequent questions I get asked is how to find the right people to be the Data Owners. Anyone who has ever tried to implement Data Governance understands how important it is to have the correct people in these roles, but it can be hard to actually identify them. In this article Nicola shares a simple approach for identifying the correct data owners.

Cyber Security

LEAN CYBER SECURITY; A PRIMER FOR CISOS

INTRODUCTION
The rise of cyber risks is placing the average stressed-out CISO in further peril. With mega-hacks hitting organisations, how can we deliver security improvements when the resource base is already under such strain? Is it possible to reduce the overheads arising from updated cyber security strategies and associated implementation plans?
There might be an answer. Cyber security strategy planning must become lean and integrate with business improvement planning to ensure it meets these demands. Within both the NHS and Police Service many CISOs are pursuing leaner strategies to secure the organisation whilst limiting resource demand.