If you want your software developers to create an app that perfectly addresses the needs of its users, proper requirements gathering is inescapable. The more attention you spend on defining requirements before the development commences, the less hassle you’ll have...
Instead of being treated as another box checking exercise and a quick win, cyber resilience must be embedded into the right corporate structures and used to channel a different culture from the top down around cyber security.
One of the most frequent questions I get asked is how to find the right people to be the Data Owners. Anyone who has ever tried to implement Data Governance understands how important it is to have the correct people in these roles, but it can be hard to actually identify them. In this article Nicola shares a simple approach for identifying the correct data owners.
The rise of cyber risks is placing the average stressed-out CISO in further peril. With mega-hacks hitting organisations, how can we deliver security improvements when the resource base is already under such strain? Is it possible to reduce the overheads arising from updated cyber security strategies and associated implementation plans?
There might be an answer. Cyber security strategy planning must become lean and integrate with business improvement planning to ensure it meets these demands. Within both the NHS and Police Service many CISOs are pursuing leaner strategies to secure the organisation whilst limiting resource demand.