Enterprise Risk Management

  Risk Management (VRM) allows organizations to proactively manage IT security risks by combining asset business context, actionable threat intelligence, vulnerability assessment results, and comprehensive workflows – More secure organization with proactive management of IT security risks – Accurate identification and prioritization of vulnerability issues – Link audit procedures and results to enterprise risks and controls. – Assign, measure, and report on vulnerability program KPIs

Blockchain and whistle blowers

A whistleblower is a person who comes forward and shares his/her knowledge on any wrongdoing which he/she thinks is happening in the whole organisation or in a specific department. A whistleblower could be an employee, contractor, or a supplier who becomes aware of any illegal activities. To protect whistleblowers from losing their job or getting mistreated there are specific laws. Most companies have a separate policy which clearly states how…

Why asset important for information security management

Asset management There is a lot to know about asset management because it has become more of a necessity for businesses across all verticals. Let’s first understand – what is an asset ?? Anything that has value to the organization is known as asset. Now the question arise who should be the asset owner? Asset owner can normally be a person who operates the asset and make sure that information…

Security polices embedded in the information technology…..

The confidentiality,integrity,availability of the data is very important for the good governance  Failure to adequately secure information increases the risk of financial and reputational losses.   This information security policy outline approach to information security management. It provides the guiding principles and responsibilities necessary to safeguard the security of the information systems. Supporting policies, codes of practice, procedures and guidelines provide further details. The main idea is basically to Provide the…

How to Identify Security Breaches Quickly?

Network administrator and cabling teams are the key persons spotting the security breaches in an organization. Two technologies currently used in network monitoring systems: SPAN (switched port analyzer), also known as port mirroring, and TAP (traffic access point). A SPAN port copies traffic from any traffic port to a single unused port. SPAN ports also prohibit bi-directional traffic on that port to protect against back flow of traffic into the…