Home

Top 5 Priorities for Wall Street CIOs in 2014

Posted by Chiranjeev Bordoloi | On: Oct 25 2013 | Comments (0)
Executing a risk-based approach to mobile security balancing all of the salient factors that impact success: security effectiveness, user convenience, capex/opex costs i.e. TCO , intrusion prevention/detection i.e. mitigate the threat of code execution, network...
agileitgovernance (2)

Your business may have experienced an average of 122 successful attacks this week

Posted by Chiranjeev Bordoloi | On: Oct 18 2013 | Comments (0)
Finally got to reading the 2013 Cost of Cyber Crime Study and was quite surprised by these findings: The average annualized cost of cybercrime incurred per organization was $11.56 million, with a range of $1.3 million to $58 million. This is an increase of 26...
cybersecurity-(4)

35 Strategies to Mitigate Targeted Cyber Intrusions

Posted by Chiranjeev Bordoloi | On: Oct 08 2013 | Comments (0)
I would like to thank the folks who attended my ISACA presentation in San Francisco and and later requested that I publish my thoughts on this blog more frequently than I have been. I hope to be more regular from now on. For those who could not attend, my presentation...

What Kind of Threats and Risks Does the CISO Need to Consider

Posted by Chiranjeev Bordoloi | On: Jan 23 2013 | Comments (0)
CISOs must understand multiple business and technical facets of the organizations for which they work. This understanding provides a foundation for defining a risk-based approach to protect the organization’s critical information assets. The best security leaders...

This Week’s Best IT Security Governance Resources #19

Posted by Chiranjeev Bordoloi | On: Jan 21 2013 | Comments (0)
More and more companies face unique challenges when it comes to detecting insider threats. Here are some basic steps that all organizations should take to monitor insider fraud. Of the many policy issues concerning the tech sector, few are as intensely debated...

After a Cyber Attack, Be Prepared to Follow SEC Guidelines about Communication

Posted by Chiranjeev Bordoloi | On: Jan 18 2013 | Comments (0)
Cyberattacks are becoming more and more common. According to Reuters, most companies hit by cyberattacks don’t go public with the incident. There are, instead, a few guidelines given by the Finance Division of the Corporation Securities and Exchange Commission...

Why we need information security laws and regulations for the financial sector

Posted by Chiranjeev Bordoloi | On: Jan 16 2013 | Comments (0)
Among the most important issues that managers and system administrators in the financial services sector are grappling with is the increased focus on information security laws and compliance. This new global economy and the constant evolution of infrastructure...

What it takes to be a good CISO/CSO

Posted by Chiranjeev Bordoloi | On: Jan 14 2013 | Comments (2)
More organizations worldwide are hiring dedicated security executives. Over the last five years the role of a Chief Information Security Officer (CISO) has changed from a safeguard to being part of the business. The presence of a CISO is almost indispensable in...

This week’s best IT Security Governance Resources #18

Posted by Chiranjeev Bordoloi | On: Jan 11 2013 | Comments (0)
Not surprisingly, with the arrival of the New Year many experts have made their 2013 predictions, with most believing that the biggest threats for this year are on cloud and mobile computing. Thor Olavsrud provided some useful information regarding the top security...

The rise of ransomware

Posted by Chiranjeev Bordoloi | On: Jan 09 2013 | Comments (0)
At the end of last year I was invited to discuss a very specific threat in an interview hosted by CBS News. The main point of interest was ransomware – a type of cyber-attack that is becoming more common and could affect anybody. Ransomware is a type of malware...