Category Archives: Security Management

2015 Information security breaches survey, conducted by PwC

There is a survey report available (2015, UK specific). It contains several good information for security professionals and management. From main site: The information security breaches survey is carried out annually for Department for Business, Innovation and Skills (BIS) by … Continue reading

Posted in Security Incidents and Cases, Security Management | Comments Off on 2015 Information security breaches survey, conducted by PwC

Cloud adaptation and security budget, reports by Microsoft and 451 Research

Microsoft has published interesting report, which contains information about security budget as well, good to know information for people working with information security management. Beyond Infrastructure: Cloud 2.0 Signifies New Opportunities for Cloud Service Providers Beyond Infrastructure- Cloud 2.0 Signifies … Continue reading

Posted in Cloud Security, Security Management | Comments Off on Cloud adaptation and security budget, reports by Microsoft and 451 Research

“Tiger in the cage” examples, bow-tie analysis as part of risk assessment

Bowtie analysis might be an helpfull tool for risk assessment. I used yEd to create my own bowtie (see the source at the end). Bow tie analysis in the ISO 31010. Bow tie analysis is a simple diagrammatic way of … Continue reading

Posted in Basic Tools, DIY, Security Management, Security Threats, Security Training, Awareness and Reports, Tests, Tips, Tools | Comments Off on “Tiger in the cage” examples, bow-tie analysis as part of risk assessment

Global Risks Report by World Economic Forum

The latest Global Risks Report 2015 by World Economic Forum is available . The report is based on an annual Global Risks Perception Survey. This is in interesting report and can be usefull when comparing different risks and when trying … Continue reading

Posted in ICT Leadership and Management, Risk Management, Security Management, Security Threats | Comments Off on Global Risks Report by World Economic Forum

Is IP address personal data? (from criminal law point of view)

CoE (Council of Europe) Cybercrime has pubslihed a report called “Rules on obtaining subscriber information“, where questionnaire responses from different countries has been published. Some of the questions are: Question 1: Is the term “IP address” defined for criminal law … Continue reading

Posted in ICT Regulation, Security Management | Comments Off on Is IP address personal data? (from criminal law point of view)

Recommended Book: Cybersecurity for executives

A new book from 2014 “Cybersecurity for Executives: A Practical Guide” is a great book, and definitely worth for reading for persons working on the security management, or as the title says, for executives. Title: Cybersecurity for executives Author : … Continue reading

Posted in ICT Books, ICT Leadership and Management, Security Management | Comments Off on Recommended Book: Cybersecurity for executives

2 Reports on Cybercrime

EC3 (European Cybercrime Centre at Europol) has published a good report on the cybercrime, worth to take a look. The other report by McAfee complements with estimations of the costs. Definitions TechTarget: Cybercrime is a term for any illegal activity … Continue reading

Posted in Security, Security Management, Security Training, Awareness and Reports | Comments Off on 2 Reports on Cybercrime