Category Archives: ICT Leadership and Management
Recommended Book:Enterprise Cybersecurity
I was positively surprised about this book “Enterprise Cybersecurity“, and I can happily recommend it to anyone working with security management. There are more than one way to do the things, and this book is showing one alternative way on … Continue reading
Six Thinking Hats, a method to talk about ideas, problems and challenges
Six Thinking Hats method can be useful when taking a discussion/workshop with several participants and at the same time you want to make sure that you will get some concrete results out of the session. This method nicely gives a … Continue reading
DIY CRM: part 2 for personal task management
This is continuation to DIY CRM: part 1 for a small team, where the MS Access was used as a simple tool to keep track of tasks or cases for a team. The same tool can be used for a … Continue reading
DIY CRM: part 1 for a small team
MS Access is included in the MS Office set of tools. I was playing around with it, and discovered that it comes with several build-in templates for different tasks. One of the interesting template is “Customer service” template, that was … Continue reading
Survey of ISO certifications, results for 2015
ISO is having surveys about number of ISO certifications, it is worth to have a look ๐ The table below is taken from the executive summary. There are also excel files available for each ISO standard that shows certifications per … Continue reading
Study report “Women in Cybersecurity”, by several co-authors
It is worth to have a look at the recent study report called The 2017 Global Information Security Workforce Study: Women in Cybersecurity. It can be found at the research page od the the Center for Cyber Safety and Education, … Continue reading
Cloud Security Spotlight Report (survey)
Yet another survey results are available in the “2016 Cloud Security Spotlight Report” and is interesting reading. slides webinar Example Applications Q: Which of the following cloud applications are deployed or will be deployed in your organization? Example Authentication Q: … Continue reading