Global Business Resilience at Cognizant enabled decision-making and business continuity throughout the COVID-19 pandemic by focusing on intelligence gathering and sharing initiatives.
Just as you wouldn’t recommend going to a basement during a fire nor running outside during a tornado, it is crucial to outline safety plans according to cyber disasters. Organizations can do this by implementing a business cybersecurity plan.
This month’s leadership columnist Mike Gips proposes a satirical alternative to the need for leadership prevailing in security today, taking inspiration from essayist Jonathan Swift and his “Modest” proposal for addressing food scarcity, malnourishment, blight and overpopulation within Ireland in the 1700s.
You must’ve heard it dozens of times by now: passwords are not secure enough to protect business data. But everyone mentions alternatives to passwords as if uprooting your current identity authentication system is a piece of cake.
Trust is the ultimate business enabler. When enterprises inspire trust in all their stakeholders, they create a platform for better business performance. But not all brands are starting from a level playing field, says Emily Frolick, KPMG’s Partner, IT Audit and Assurance.
Two school district technology leaders share their first-hand experiences and insights into the cybersecurity vulnerabilities affecting the K-12 sector, along with how to design a security roadmap and the challenges that come along with implementing one.
As a security leader, do you better support the industry and serve your employer by attending in person events or do you play it safe and attend virtually, forgoing the in-person conversations, random encounters, and charged environment that bring so much value to these conferences? Risk professionals needs to weigh look at the data, look at the advice, and weigh the pros and cons of these situations, to maintain their status as a leader within the organization.