Gartner Blog Network

Tag: 'information-security' Blog Posts

from the Gartner Blog Network

Gartner Security and Risk Summits are back!

by Sam Olyaei  |  May 22, 2017

It's that time of the year again... less than a month away from event season! We start in DC on June 12th , we tour the world (Tokyo, Sao Paolo,...

Read more »

NY DFS Cybersecurity Regulation goes into effect today, and it is already outdated!

by Sam Olyaei  |  March 1, 2017

After an initial delay, the New York State Department of Financial Services (NY DFS) finalized its new cybersecurity regulation that goes into effect March 1st (today). The new rules require...

Read more »

The Cybersecurity Talent Shortage.... is a myth?

by Sam Olyaei  |  December 21, 2016

Over the last year, I (along with others on my team) have received numerous inquiries regarding a "talent crisis" that is brewing in the information/cyber security industry.  Organizations continue to...

Read more »

Emerging Risks in Cybersecurity: Gartner's Top Ten Predictions

by John Wheeler  |  August 26, 2016

This week, I presented Gartner's top ten strategic predictions for security at the South Africa Reserve Bank Cybersecurity Conference in Johannesburg, South Africa. In my remarks, I explained that today’s...

Read more »

How Is Cyber Security Like a Hummer?

by John Wheeler  |  May 29, 2015

In my previous blog post, I utilized the analogy of a race car vs. an armored car to demonstrate the need for a "Risk First, Security Second" approach to cyber...

Read more »

To Finish First in Digital Business, Security Must Be Second

by John Wheeler  |  May 19, 2015

This weekend, the famous Indianapolis 500 will be run for the 99th time with a slate of more than 30 race cars competing to win the "Greatest Spectacle in Racing"....

Read more »

Seven Ways to IT Risk Management Success

by John Wheeler  |  April 1, 2015

With all the hype and hysteria around the mounting cyber-security threats, companies are seeking to strengthen their management of IT risk. The Wall Street Journal reported last week that some...

Read more »

What Is In Your GRC "Junk Drawer"?

by John Wheeler  |  March 3, 2015

Everyone has one. Somewhere in their kitchen or garage is the infamous "junk drawer". Over time, the drawer fills up with gadgets, tools, scraps of paper with to do lists...

Read more »

Five Tips for Companies Considering Cyber Insurance

by John Wheeler  |  March 2, 2015

As cyber attacks and data breaches are surfacing on a daily basis, our clients are looking for ways to mitigate the risk associated with these events. One of the most...

Read more »

Why Social Media Risks Are Skyrocketing and What You Can Do to Protect Your Company

by John Wheeler  |  October 6, 2014

In the news today, social media risks for individuals are certainly grabbing the headlines. Celebrity hacking, child exploitation, identity theft and fraud, just to name a few. However, the risks...

Read more »