Gartner Blog Network

Category: 'risk-management' Blog Posts

from the Gartner Blog Network

Recent Cyber Attacks Demonstrate Why IRM is Critical for ERM Success

by John A. Wheeler  |  October 12, 2018

In the last few weeks, several global shipping ports have been targeted with major cyber attacks. Ports in San Diego, California and Barcelona, Spain experienced significant business disruption as a...

Read more »

GDPR Requires IRM For Fast and Effective Response

by John A. Wheeler  |  September 14, 2018

This week, Gartner hosted its annual Security & Risk Management Summit in London and the buzz at the event centered on the new risks associated with the General Data Protection...

Read more »

2018 IoT Endpoint Security Assessment Services Survey

by Erik T. Heidt  |  August 30, 2018

2018 has seen a significant uptick in Gartner clients asking for help identifying security services in support of their IoT efforts. At this time I don't believe there is sufficient demand to make...

Read more »

Does Decentralized Identity Need an Identity Neutrality Manifesto

by Homan Farahmand  |  July 12, 2018

If you are not familiar with the decentralized identity, you can start here. The promise of decentralized identity – self-sovereign identity in the case of people identity – is to...

Read more »

2 Success Factors Every Top IRM Tech Solution Must Deliver

by John A. Wheeler  |  June 29, 2018

Have you ever been driving your car down the road when you notice the ride is bumpier than usual? Or perhaps, the car strangely veers to the right or the...

Read more »

Are You Ready for Some IRM? Gartner's 2018 Security & Risk Summit Events Span the Globe

by John A. Wheeler  |  April 30, 2018

It's that time of year again! Preparations for our upcoming global summit events are at a fever pitch. A central theme for this year's summit is how integrated risk management...

Read more »

My Top 8 Popular Gartner Blog Posts for February 2018

by John A. Wheeler  |  March 2, 2018

Not to be outdone by my esteemed colleague Dr. Anton Chuvakin, here are my top 8 blog posts read in February 2018: Gartner's New IRM Magic Quadrant Signals End of GRC Era ...

Read more »

Decentralized Identity Hard Work Begins

by Homan Farahmand  |  February 15, 2018

Gartner introduced the decentralized identity (DID) conceptual architecture in "Blockchain: The Dawn of Decentralized Identity [1]," which was published in September 2016. In a decentralized identity model, users generate and manage their own...

Read more »

IoT Security | NISTIR 8200 in Draft - Act NOW!

by Erik T. Heidt  |  February 14, 2018

We knew this was coming, and this is a big day in IoT security and risk management. Let's explore why it is important for your organization to take action now,...

Read more »

Comments: 2

3 Resolutions to Turn GRC Failure Into IRM Success

by John A. Wheeler  |  January 3, 2018

As we begin the new year, many of our clients are searching for ways to turn their failures with Governance, Risk and Compliance (GRC) technology into successful Integrated Risk Management...

Read more »