Managing the Relationship Between Information Technology and Information Security
It’s easy to use the terms “Information Technology (IT)” and “Information Security (IS)” interchangeably. They are equally important but serve...
In today's video, we're going to explain what it means to be independent and qualified and why it's so important for an ISO or CISO to be both.
The Virtual CISO Whitepaper
https://www.bedelsecurity.com/the-virtual-ciso-whitepaper
Independent Collaboration Part 1: A Concept for Outsourcing IT in Financial Institutions
https://www.bedelsecurity.com/blog/independent-collaboration-part-1-a-concept-for-outsourcing-it-in-financial-institutions
Independent Collaboration Part 2: A Framework for Outsourcing IT in Financial Institutions
https://www.bedelsecurity.com/blog/independent-collaboration-part-2-a-framework-for-outsourcing-it-in-financial-institutions
Managing the Relationship Between Information Technology and Information Security
https://www.bedelsecurity.com/blog/managing-the-relationship-between-information-technology-and-information-security
Two Essential Ingredients to Improve Your Information Security Program
https://www.bedelsecurity.com/blog/two-essential-ingredients-to-improve-your-information-security-program
The 3 Key Roles in Cybersecurity
https://www.bedelsecurity.com/blog/the-3-key-roles-in-cybersecurity
Ensuring Independence in Your Virtual CISO
https://www.bedelsecurity.com/blog/ensuring-independence-in-your-virtual-ciso
It’s easy to use the terms “Information Technology (IT)” and “Information Security (IS)” interchangeably. They are equally important but serve...
While the definition of a partner is fairly broad, its principles apply to a very broad spectrum of relationships. In the cybersecurity realm, this...