Acceleration Economy, which provides advisory services through real-world practitioners, defines a new level of value for digital business decision making.
Search Results: risk management (766)
Analyst Robert Wood shares the three areas CISOs should focus on to improve their performance: data, supply chain risk, and team cultures.
CISO practitioner analyst Chris Hughes emphasizes why today’s CISOs need to prioritize their agenda to quantify risk, embrace zero trust, and fight talent burnout
When a large oil and gas company in southeast Europe set out to migrate on-premises data and applications to public cloud infrastructure, they turned to Lookout to help address the myriad of security challenges that emerged.
Learn about the top 5 cloud services risks, how to mitigate the risks, and how to secure cloud operations with the Lookout Security Platform.
During the Women in Tech session at Community Summit 2022, Cathy Richards-Ingram from Avalara, Jennifer Harris from TMC, and Ann D’Emilio from Vertex shared their experiences and advice as women in the technology field.
Analyst Chrus Hughes takes a look at EPSS, a new approach to evaluating vulnerability that takes into account not only criticality and scores, but also exploitability.
Janet looks at this year’s Verizon Data Breach Investigations Report (DBIR) and singles out a few facts that can help organizations evaluate risk in partnership strategy.
Most companies still struggle with managing credit manually. Keeping track of customers, payment terms, ratings and more in a mix…
Quantifying cyber risk helps board members and other business leaders see the importance of cybersecurity investment. As Chris Hughes explains, the FAIR model offers a framework to do this.
Robert Wood explores several areas of risk that can emerge with the adoption of low-code/no-code applications.
Data loss prevention policies sound good on the surface, but dig deeper and you’ll find that they come with unexpected risks. Analyst Robert Wood explains what these risks are and how to avoid them.
Janet Schijns looks at the impact a partner can have, both positive and negative, on your firm’s data project, and offers tips on vetting and choosing the right ones.
Driving down the IAM environment’s complexity should be a major priority for all organizations, especially given the common problem of attracting and retaining technical talent.
Automated risk management is growing in importance as global finance becomes more interconnected and mobile — and therefore more complex.
When it comes to cyber risk quantification, cybersecurity as an industry has become abysmal. How can organizations overcome these challenges?
Vulnerability management is always a daunting task. In multi-cloud scenario, it’s even more challenging, as Chris Hughes explains in the context of AppSec.
In Episode 44 of the CXO2 Minute, Wayne continues his examination of a CISO’s place within an organization and explains why boards are responsible for understanding all sides of technology.
When managing threats, no organization has the same exact needs. Robert Wood shares four factors to look at to help find solutions that fit, no matter the scenario.
The cloud-native approach will modernize enterprise software architecture — but what are the security implications? Bill Doerrfeld explains.