IT risk management


Are Service Providers Prepared for Cybersecurity Risks Post-Heartbleed?

The catastrophic Heartbleed bug, disclosed in early April, impacted hundreds of thousands of popular websites. It is considered one of the most significant, far-reaching vulnerabilities in the history of the Internet, made all the more unsettling because it’s entirely undetectable. Here’s what you can do to protect yourself and your company.

file sharing

Avoid Data Leaks: Make Content Sharing Safe and Compliant

There’s risk enough when information is housed in a single location, but when data is shared between multiple devices – and particularly when files are transferred online – maintaining security becomes far more complex. Follow this guidance when choosing a file-sharing solution for your firm.

enterprise resource planning erp

Who Is In Control: You Or Your ERP?

IT risk oversight is a hot topic for boards of leading companies. It is one of the critical components of an organization’s competitive advantage. Recent industry studies show that companies lose billions of dollars on failed IT-related projects that don’t reach their full potential. Because IT initiatives are usually enterprisewide, they naturally impact many aspects […]

Risk Management in IT Projects

Risk Management in IT Projects

All major IT-based software projects come with some degree of risk. The question, then, that needs to be answered is: In what way should executives step up and confront these issues before they become a major concern?

audit committee members rest assured

Tone at the Top: Rest Assured

Serving on an audit committee is one of the most challenging, prestigious and fulfilling roles a business professional can play. It provides the opportunity to give back by sharing knowledge gained and lessons learned firsthand. And yet, the job’s inherent responsibilities can result in a very serious case of sleep deprivation. The results of the […]

CCI Interview Series: Cheryl Strackeljahn of Deloitte on IT Risk Management

  • June 30, 2009

The current high-risk environment creates an imperative for IT leaders to exploit information technology to manage risks both to existing assets and to future growth. IT should be used to enable systemic risk management by delivering a high-quality, reliable continuum of information from dispersed operations for heightened awareness, improved decision making and enhanced business performance. In the second installment of ...