Companies remain on the hook for ensuring their vendors are up to task when it comes to cybersecurity, privacy compliance and continuity of operations. This checklist can help determine the maturity of your vendor risk management program.
Some of the most basic tenets of password account management have failed, leaving us with a dreadful combination of poor user experience and inadequate security.
Some hotel chains are no longer allowing the signs, in response to security concerns about rooms being unchecked for several days, which can potentially expose a hotel to security risks.
In last month’s column I took you though the research process in preparing for the interviews of executives and other key functional leaders in the enterprise. Now that you are ready to start conducting interviews, it is important to have a core list of key questions that you will ask each interviewee, along with specific questions unique to their role or function.
Aside from your good name, what should you bring with you to your new employer? In today’s climate, the answer is adamantly not someone else’s intellectual property.
Here are some of the “front of mind” issues that senior security executives and the vendor ecosystem (consultants, integrators and technology providers) are wrestling with.