Although you can automate many tasks by using a good patch management application, there are many tasks that you will still need to manually perform.… Read More »Security Management: How do other organizations establish mission-based information types?
Without the right organization model, the proper roles, skills, processes and governance, the chances of succeeding are slim, assessing risks that threaten the execution of… Read More »GISF: What are the success factors with information security management?
Unfortunately, many organizations lack a clear idea of how to identify and track data across multiple systems, which involves detecting sensitive data in motion and… Read More »Data Loss Prevention: What types of data loss is your organization most concerned about?
ISSEP: Is access to electronic information systems and facilities limited by policies and procedures?
You take reasonable steps to maintain the security of the information you store in your systems or in physical records, akin include who has access… Read More »ISSEP: Is access to electronic information systems and facilities limited by policies and procedures?
With smart invoicing, network business rules alert suppliers about errors and prevent incorrect invoices from entering your process workflow or back-end system, otherwise, in the… Read More »Security Management Program: What was the original reason for procuring the service?
Security Management comprises the plans, methods and procedures used to meet missions, goals and objectives, and in doing so, supports performance-based management, quality management is… Read More »Security Management: Have the selected controls or is there a realistic plan for implementation?
The information and information systems needed by the organization to accomplish its assigned mission, protect its assets and individuals, fulfill its legal responsibilities, and maintain… Read More »ISSEP: What is your organizations role in categorizing information systems?
Data Masking: Does your organization have a privacy/data protection awareness and training program for employees and other stakeholders who have access to sensitive or confidential personal information?
The risks involved with databases vary from organization to organization, depending on the type of information and the amount of importance it holds for your… Read More »Data Masking: Does your organization have a privacy/data protection awareness and training program for employees and other stakeholders who have access to sensitive or confidential personal information?