Gartner Blog Network

Category: 'cyber-security' Blog Posts

from the Gartner Blog Network

Bringing Clarity to "Fluffy Management Stuff" With IRM

by John Wheeler  |  March 29, 2017

I had the honor and privilege to spend several days last week with 400 IT leaders at our Gartner Peer Forum in Orlando, Florida. Speaking to the group gave me...

Read more »

NIST Cybersecurity Framework Supports Use of IRM

by John Wheeler  |  January 9, 2017

2017 brings a new focus and urgency to improving cybersecurity at all levels of our society. While a fierce debate rages in Washington, DC over the cyber-intrusion impact on the...

Read more »

Emerging Risks in Cybersecurity: Gartner's Top Ten Predictions

by John Wheeler  |  August 26, 2016

This week, I presented Gartner's top ten strategic predictions for security at the South Africa Reserve Bank Cybersecurity Conference in Johannesburg, South Africa. In my remarks, I explained that today’s...

Read more »

Operational Risk Management Solution Ratings Now Available

by John Wheeler  |  February 20, 2016

The first Critical Capabilities for Operational Risk Management (ORM) Solutions (restricted to Gartner clients only) published this week along with the roll-out of our new Peer Insights for Risk Management Solutions...

Read more »

Without a Solid Foundation, Risk Management Is Doomed

by John Wheeler  |  August 23, 2015

This week, I'm in Sydney at our 2015 Gartner Security & Risk Management Summit speaking about Integrated Risk Management Solution (IRMS) strategies. Many companies are looking to RMS technology to...

Read more »

Gartner's Brazil Summit Keynote Focuses on Digital Risk

by John Wheeler  |  August 10, 2015

Today, I had the privilege and honor to help kick-off Gartner's 2015 Security and Risk Management Summit in Sao Paulo, Brazil. Joined by my Gartner colleagues Andrew Walls (2014 Gartner Analyst...

Read more »

Security Solutions Can Lead to Risk Problems in the Digital World

by John Wheeler  |  June 17, 2015

This week, a password security company announced that it had been the victim of what they described as a "network compromise" by an unknown intruder. In other words, the company...

Read more »

How Is Cyber Security Like a Hummer?

by John Wheeler  |  May 29, 2015

In my previous blog post, I utilized the analogy of a race car vs. an armored car to demonstrate the need for a "Risk First, Security Second" approach to cyber...

Read more »

To Finish First in Digital Business, Security Must Be Second

by John Wheeler  |  May 19, 2015

This weekend, the famous Indianapolis 500 will be run for the 99th time with a slate of more than 30 race cars competing to win the "Greatest Spectacle in Racing"....

Read more »

Are Millennials the "GRC Generation"?

by John Wheeler  |  May 12, 2015

This week, the Pew Research Center announced that the Millennials have officially surpassed Generation X as the largest generation in the U.S. workforce (see graphic below). For the past few...

Read more »