Category Archives: ICT Leadership and Management

DIY CRM: part 2 for personal task management

This is continuation to DIY CRM: part 1 for a small team, where the MS Access was used as a simple tool to keep track of tasks or cases for a team. The same tool can be used for a … Continue reading

Posted in Anvanced Tools, Basic Tools, DIY, ICT Leadership and Management, Personal Development, Recommended Free Tools, Tests, Tips, Tools | Comments Off

DIY CRM: part 1 for a small team

MS Access is included in the MS Office set of tools. I was playing around with it, and discovered that it comes with several build-in templates for different tasks. One of the interesting template is “Customer service” template, that was … Continue reading

Posted in Basic Tools, DIY, ICT Leadership and Management, Tests, Tips, Tools | Comments Off

Survey of ISO certifications, results for 2015

ISO is having surveys about number of ISO certifications, it is worth to have a look The table below is taken from the executive summary. There are also excel files available for each ISO standard that shows certifications per country … Continue reading

Posted in ICT Leadership and Management, ICT Standards, Security Certifications, Security Management, Security Standardization and Practises, Security Training, Awareness and Reports | Comments Off

Study report “Women in Cybersecurity”, by several co-authors

It is worth to have a look at the recent study report called The 2017 Global Information Security Workforce Study: Women in Cybersecurity. It can be found at the research page od the the Center for Cyber Safety and Education, … Continue reading

Posted in Cybersecurity, ICT Leadership and Management, Security News, Security Training, Awareness and Reports | Comments Off

Cloud Security Spotlight Report (survey)

Yet another survey results are available in the “2016 Cloud Security Spotlight Report” and is interesting reading. slides webinar Example Applications Q: Which of the following cloud applications are deployed or will be deployed in your organization? Example Authentication Q: … Continue reading

Posted in Cloud Security, ICT Leadership and Management, Security Management | Comments Off

2015 Cost of Data Breach Study, reports conducted by Ponemon and sponsored by IBM

From IBM X-Force Research page IBM is proud to sponsor the tenth annual Cost of Data Breach Study, the industry’s gold-standard benchmark research independently conducted by Ponemon Institute. This is another interesting source of information when comparing your organization to … Continue reading

Posted in Cybersecurity, ICT Leadership and Management, Security Management, Security Training, Awareness and Reports | Comments Off

Survey Report on Endpoint Security, by Ponemon

Yet another survey report from Ponemon, called 2015 State of Endpoint Report: User-Centric Risk. The survey covered about 700 security practitioners. “This annual study is conducted to understand trends and changes in endpoint risk in organizations. An endpoint can include … Continue reading

Posted in ICT Leadership and Management, Risk Management, Security Management, Security Training, Awareness and Reports | Comments Off