Gartner Blog Network

Tag: 'cybersecurity' Blog Posts

from the Gartner Blog Network

Here's Why IRM Solutions Are Superior to Archaic GRC Technology

by John Wheeler  |  May 2, 2019

Gartner clients are consistently searching for ways to improve their risk management programs to deliver greater value to the enterprise. Whether it is to bolster performance in support of new...

Read more »

4 Reasons Why GRC Is a Useless Term

by John Wheeler  |  March 6, 2019

It has been 5 years since Gartner embarked on the journey to enhance our coverage of the risk management technology marketplace. That journey included in-depth survey research and countless interactions...

Read more »

GDPR Requires IRM For Fast and Effective Response

by John Wheeler  |  September 14, 2018

This week, Gartner hosted its annual Security & Risk Management Summit in London and the buzz at the event centered on the new risks associated with the General Data Protection...

Read more »

2 Success Factors Every Top IRM Tech Solution Must Deliver

by John Wheeler  |  June 29, 2018

Have you ever been driving your car down the road when you notice the ride is bumpier than usual? Or perhaps, the car strangely veers to the right or the...

Read more »

Cybersecurity Is Critical to the M&A Due Diligence Process

by Sam Olyaei  |  May 1, 2018

Another merger, another acquisition, another breach.... Organizations are exposing themselves to undue risk by overlooking cybersecurity implications during the screening and due diligence process of a M&A transaction. A few...

Read more »

Are You Ready for Some IRM? Gartner's 2018 Security & Risk Summit Events Span the Globe

by John Wheeler  |  April 30, 2018

It's that time of year again! Preparations for our upcoming global summit events are at a fever pitch. A central theme for this year's summit is how integrated risk management...

Read more »

New Job Alert: Virtual CISO

by Sam Olyaei  |  February 28, 2018

  Are you an Executive/IT leader/CIO with oversight for security? Do you find yourself resource constrained and reactive? Do you have any idea where your critical data lie? How about...

Read more »

Equifax Data Breach: It's the End of Cybersecurity as We Know It

by John Wheeler  |  September 14, 2017

As most everyone knows by now, one of the single largest data breaches in history was disclosed last week by the credit reporting giant, Equifax. While most people are rightly...

Read more »

The Middle East cannot continue to throw money at Cybersecurity!

by Sam Olyaei  |  July 25, 2017

The Middle East is at a crossroads in cybersecurity practices. Home to more than half of the world's natural gas and oil reserves, coupled with future megaevents such as Expo...

Read more »

Gartner Security and Risk Summits are back!

by Sam Olyaei  |  May 22, 2017

It's that time of the year again... less than a month away from event season! We start in DC on June 12th , we tour the world (Tokyo, Sao Paolo,...

Read more »