Information Security Policy
he policy must include a description of the main roles and responsibilities of information security management. Set out the requirements for staff and contractors, processes and technology in relation to information security, recognising that staff and contractors at all levels have responsibilities in ensuring financial institutions’ information security.
How to sell risk assessment benefits to IT execs
You know you need a risk assessment to show that you’re secure and to find the problems that expose your enterprise to risk. But how do you sell your CEO or the board on that expensive proposition?
What will the IT department look like in the future?
Tags: artificial intelligence, Cloud, IaC, IAAS, Infrastructure, Infrastructure as a Service, Machine learning, Operating Model, organisation, Outsourcing, RPA, vendor management 2020 has given us a significant change to how we work, how technology works for us and how we integrate with the world as a whole. The internet provided the starting pistol for this phase […]