Gartner Blog Network

Category: 'cyber-security' Blog Posts

from the Gartner Blog Network

NIST Cybersecurity Framework Supports Use of IRM

by John Wheeler  |  January 9, 2017

2017 brings a new focus and urgency to improving cybersecurity at all levels of our society. While a fierce debate rages in Washington, DC over the cyber-intrusion impact on the...

Read more »

Emerging Risks in Cybersecurity: Gartner's Top Ten Predictions

by John Wheeler  |  August 26, 2016

This week, I presented Gartner's top ten strategic predictions for security at the South Africa Reserve Bank Cybersecurity Conference in Johannesburg, South Africa. In my remarks, I explained that today’s...

Read more »

Operational Risk Management Solution Ratings Now Available

by John Wheeler  |  February 20, 2016

The first Critical Capabilities for Operational Risk Management (ORM) Solutions (restricted to Gartner clients only) published this week along with the roll-out of our new Peer Insights for Risk Management Solutions...

Read more »

Without a Solid Foundation, Risk Management Is Doomed

by John Wheeler  |  August 23, 2015

This week, I'm in Sydney at our 2015 Gartner Security & Risk Management Summit speaking about Integrated Risk Management Solution (IRMS) strategies. Many companies are looking to RMS technology to...

Read more »

Gartner's Brazil Summit Keynote Focuses on Digital Risk

by John Wheeler  |  August 10, 2015

Today, I had the privilege and honor to help kick-off Gartner's 2015 Security and Risk Management Summit in Sao Paulo, Brazil. Joined by my Gartner colleagues Andrew Walls (2014 Gartner Analyst...

Read more »

Security Solutions Can Lead to Risk Problems in the Digital World

by John Wheeler  |  June 17, 2015

This week, a password security company announced that it had been the victim of what they described as a "network compromise" by an unknown intruder. In other words, the company...

Read more »

How Is Cyber Security Like a Hummer?

by John Wheeler  |  May 29, 2015

In my previous blog post, I utilized the analogy of a race car vs. an armored car to demonstrate the need for a "Risk First, Security Second" approach to cyber...

Read more »

To Finish First in Digital Business, Security Must Be Second

by John Wheeler  |  May 19, 2015

This weekend, the famous Indianapolis 500 will be run for the 99th time with a slate of more than 30 race cars competing to win the "Greatest Spectacle in Racing"....

Read more »

Are Millennials the "GRC Generation"?

by John Wheeler  |  May 12, 2015

This week, the Pew Research Center announced that the Millennials have officially surpassed Generation X as the largest generation in the U.S. workforce (see graphic below). For the past few...

Read more »

Digital GRC: The Dawn of a New Era

by John Wheeler  |  April 29, 2015

On the heels of the publication of our Cool Vendors in Risk Management report, I am now beginning to see the dawn of a new era in governance, risk and...

Read more »