Many CISOs have lost the ability to choose whether cloud computing is coming to the company. Chief Financial Officers are demanding the cost savings of the cloud, especially during this tentative economic recovery where every penny must be stretched to its maximum capacity. In an attempt to be responsive and bridge the CISO – CFO
CISO Executive Network
Log File Management & Retention Programs: Put the Systems in Place to Turn Static Logs into Active Real-Time Intelligence
Firewall, server and application log alerts can be used as real-time intelligence, but these alerts often go ignored. Even if some log alerts are investigated, many organizations often are unaware of the information they retain and how logs may be mined in the event of a data breach. It’s a privacy and security sin, but…
Don’t Let Identity Management and Access Control Take the Back Seat
Identity Management and Access Control is the foundation of a company’s data management practices. But, because of the extensive coordination that must occur within the organization, it is often a long-term strategic goal that continues to take the back seat in favor of other, more immediate projects. Often, if a company can keep the discussions…