2 min read
Managing the Relationship Between Information Technology and Information Security
It’s easy to use the terms “Information Technology (IT)” and “Information Security (IS)” interchangeably. They are equally important but serve...
2 min read
It’s easy to use the terms “Information Technology (IT)” and “Information Security (IS)” interchangeably. They are equally important but serve...
2 min read
Most information security professionals understand the compliance and business requirements of keeping management informed of the Information...
2 min read
We often run into situations where different staff in an institution have different understandings of the goals and operations of their backup...
6 min read
This article is the second of a 2-part series on building an effective outsourcing strategy for the various components of IT for financial...
4 min read
It sounds like a total oxymoron: Independent Collaboration. On the Predictive Index, those two words are on opposing ends of the spectrum when it...
2 min read
When the Gramm-Leach-Bliley Act was implemented, each regulatory agency adopted a set of interagency guidelines and regulations required for...
3 min read
We are seeing findings related to change management cropping up in several audit reports this year. Appropriately scoping change management can be...
2 min read
One of the first things we do when working with a new client is to establish recurring monthly meetings with a set agenda for every meeting. Having...
3 min read
I recently had the chance to speak with Cyrene Wilke, SVP Operations & Technology at Investors Community Bank in Wisconsin on the need for community...
3 min read
The access review is the most underrated control in the Information Security Officer’s toolkit.