by Fran Howarth | May 31, 2019 | Information Security>End-point Security
Recently, CyberArk’s Impact 2019 conference was held in Amsterdam, attended by some 1,000 security practitioners with an active focus on the privileged account security space. The event also afforded analysts the opportunity to quiz the company’s executives as well as...
by Nicola Askham | May 28, 2019 | Collaboration, Data Management, Feature
One of the many challenges you will have to face when implementing Data Governance is agreeing the scope of the initial phase of your initiative. By this I don’t just mean which data domains or business functions are going to be in scope. I’m thinking of associated...
by Nicola Askham | May 13, 2019 | Collaboration, Feature
It won’t surprise you to learn that I sometimes find myself writing a data governance policy for my clients. Sometimes my clients assume that I will just take a previous policy I’ve written and tweak it for them. However, this really wouldn’t be very...
by Jean-Christophe Gaillard | May 13, 2019 | Collaboration, Feature, Information Security, Role of the CIO
Excessive complexity and lack of first line integration render many GRC metrics useless Many CISOs complain of communication problems with their business. They are not being listened to. They are not getting the budget they think they should get. They feel their...