Cyber Crime – The Enterprise IT Security Threats Companies Face Nowadays...
In times where core enterprise processes are widely dependent on IT systems, employees are highly interconnected over ubiquitous technologies and “e-spionage” is gaining momentum. More and more...
View ArticleCyber Crime – The Enterprise IT Security Threats Companies Face Nowadays...
As a continuation of my first blog about Cyber Crime, I am moving on to my 2nd Blog resuming the story with the “IMPLEMENT” phase. As advanced persistent threats pursue multiple targets, many...
View ArticleCyber Crime (Part 3) – how a common hacking scenario could look like...
As promised in my last blog I want to continue with my story. Within my next entry of my blog series about Cyber Crime, I want to describe how common attack scenarios could look like and what you could...
View ArticleIT Security Award 2012
The Global IT Security & Risk Office is very proud to announce that we have won an award for Security Management in 2012. The IT Security Awards were provided on October 16th, 2012 at the IT...
View ArticleConsiderations for implementing IT Security Management in your Organization…
To give you a bigger picture about what has to be considered, I want to discuss what you should have in mind in defining an IT Security Management process. In combination with research from external...
View ArticleImplementing Operational IT Security Management in your Organization…
As I discussed in my previous post, the only way a company can achieve success in the long-term is to implement an efficient IT Security Management framework. Once your IT Security Management Framework...
View ArticleOvum BYOX Strategy Award 2013
Oooops we did it again... It gives me great pleasure to announce an outstanding win for Global IT. Under the leadership of Ralph Salomon, Maximilian Adrian, and Alex Guitman, the Global IT Security and...
View Article
More Pages to Explore .....