Category Archives: Security Management

Discussion topic, short definition for security?

If you would need to explain security in an easy way, how would you define it? I came up with 2 definitions. What is security? “Trying to influence people to take right decisions on complex things while using layman’s terms” … Continue reading

Posted in Security, Security Management, Security Training, Awareness and Reports | Comments Off on Discussion topic, short definition for security?

Test: O365 and Azure test lab guides

Microsoft is providing 30 day trial environments for Office 365 and for Azure. These trials can be used to setup a test and development environment by following the step-by-step guides from MS. If you are intending to start using those … Continue reading

Posted in Anvanced Tools, Cloud Computing, Cloud Security, Security Management, Security Products and Solutions, Security Training, Awareness and Reports, Tests, Tips | Comments Off on Test: O365 and Azure test lab guides

Recommended Book:Enterprise Cybersecurity

I was positively surprised about this book “Enterprise Cybersecurity“, and I can happily recommend it to anyone working with security management. There are more than one way to do the things, and this book is showing one alternative way on … Continue reading

Posted in Cybersecurity, ICT Books, ICT Leadership and Management, Risk Management, Security Management | Comments Off on Recommended Book:Enterprise Cybersecurity

Six Thinking Hats, a method to talk about ideas, problems and challenges

Six Thinking Hats method can be useful when taking a discussion/workshop with several participants and at the same time you want to make sure that you will get some concrete results out of the session. This method nicely gives a … Continue reading

Posted in ICT Leadership and Management, ICT Training and Courses, Innovation and new tech, Personal Development, Security Management, Tips | Comments Off on Six Thinking Hats, a method to talk about ideas, problems and challenges

Survey of ISO certifications, results for 2015

ISO is having surveys about number of ISO certifications, it is worth to have a look 🙂 The table below is taken from the executive summary. There are also excel files available for each ISO standard that shows certifications per … Continue reading

Posted in ICT Leadership and Management, ICT Standards, Security Certifications, Security Management, Security Standardization and Practises, Security Training, Awareness and Reports | Comments Off on Survey of ISO certifications, results for 2015

Process reference model (PRM) for ISMS (ISO 27001)

ISO TS 33052:2016 “Process reference model (PRM) for information security management” is in interesting document which can be useful when evaluating the possible ways to implement the information security management system (ISMS) processes (see ISO 27001 ISMS requirements). This Technical … Continue reading

Posted in Security Certifications, Security Management, Security Standardization and Practises | Comments Off on Process reference model (PRM) for ISMS (ISO 27001)

Recommended Book: The Complete Book of Data Anonymization

I was getting started to search for information about data anonymization and preparing to took a time to do “yet another internet search” for information sources; until I happened to find this book. I was positively surprised that it did … Continue reading

Posted in Books, Cloud Security, Cybersecurity, ICT, ICT Books, Security Management, Security Standardization and Practises, Security Terminology | Comments Off on Recommended Book: The Complete Book of Data Anonymization