Gartner Blog Network

Category: 'risk-management' Blog Posts

from the Gartner Blog Network

2018 IoT Endpoint Security Assessment Services Survey

by Erik Heidt  |  August 30, 2018

2018 has seen a significant uptick in Gartner clients asking for help identifying security services in support of their IoT efforts. At this time I don't believe there is sufficient demand to make...

Read more »

2 Success Factors Every Top IRM Tech Solution Must Deliver

by John Wheeler  |  June 29, 2018

Have you ever been driving your car down the road when you notice the ride is bumpier than usual? Or perhaps, the car strangely veers to the right or the...

Read more »

IoT Security | NISTIR 8200 in Draft - Act NOW!

by Erik Heidt  |  February 14, 2018

We knew this was coming, and this is a big day in IoT security and risk management. Let's explore why it is important for your organization to take action now,...

Read more »

On Demand | Securing IoT An Architectural and Risk-Driven Approach

by Erik Heidt  |  December 27, 2017

Thanks to everyone who participated the Webinar. "Securing the Internet of Things: An Architectural and Risk-Driven Approach" is now available on-demand, here is the link. Security is a top concern and...

Read more »

IoT Security | Endpoint Hardware Key Storage

by Erik Heidt  |  November 29, 2017

While cryptographic algorithms fail from time to time as computational tools advance or analytical breakthroughs occur, failures of this nature are rare events. Key storage or management failures are the leading...

Read more »

You Can't Outrun the Security Bear

by Jay Heiser  |  October 5, 2017

The September 7 Equifax hack is a hugely emotional and hyped event that continues to generate congressional and media attention.  If there is any good news, its likely that the...

Read more »

Just Published | Planning for IoT Governance and Management

by Erik Heidt  |  November 29, 2016

Michael Disabato has just published "Planning for IoT Governance and Management" (members only content) which explores technology, process and organizational considerations raised by the Internet of Things. Here are some...

Read more »

Are you trying to negotiate terms for a bag of hot dogs?

by Jay Heiser  |  September 27, 2016

Don't try to spread traditional outsourcing practices over your cloud hot dog--it just won't taste right. On a 1-to-1 basis, such as traditional outsourcing, you can negotiate any form of service...

Read more »

New Research: Create an Effective Information Risk Framework for Data and Analytics Programs

by Andrew White  |  June 10, 2016

My colleague Saul Judah just published this note: Create an Effective Information Risk Framework for Data and Analytics Programs. Few CIOs and chief data/analytics officers are adequately addressing information risk in...

Read more »

Testing Your IAM Planning Decisions Needs a Robust Risk Model

by Homan Farahmand  |  April 27, 2016

IAM planners/architects can greatly benefit from predicting the impact of a prioritization decision on operational risk, before making the actual decision. Why? Because testing an IAM planning decision in a...

Read more »