October 27, 2013

Five reasons for master data management failures
When companies forge ahead with an MDM implementation without proper planning, the MDM program ends up not meeting business needs and not being used, and often needs to be re-implemented or modified, costing additional time and money. To help MDM program sponsors and leaders that are beginning their MDM journey, here’s five of the most common pitfalls of MDM programs—and solutions for how to avoid them.


Why Green IT Is Good for Business
Because the hype and excitement over green IT has diminished over the past few years, and the specter of carbon taxes has faded, organizations have begun to put sustainable IT initiatives on the back burner, or even dismiss them entirely. But successful green IT projects usually go hand in hand with operational efficiency initiatives, where benefits drop down to the bottom line while meeting corporate sustainability goals. "Did we make any trade-offs with efficiency versus cost? There were very few," Humphries says.


Global Trends in Financial Services - Strategy
... the need to innovate and compete effectively while reducing costs and meeting regulatory requirements will create job opportunities in the compliance, project and change as well as IT areas within the financial services sector. Big data, faster computers and more powerful analytics software will also offer new opportunities for financial services organisations to improve operational effectiveness, know their customers better and unlock new sources of value both independently and in collaboration with companies in commerce and industry sectors such as retail and telco.


You Can’t Avoid A Software Audit, So Make Yourself Less Of A Target
Organizations struggle to keep control of licensing issues related to technology changes such as virtualization, cloud, bring-your-own-device, and the increasing demand for anywhere, anytime mobile access. There’s a simple truth behind the auditing issues that we see: If you don’t monitor and manage your software ecosystem, audits can quickly become financial embarrassments. To make yourself less of a target,my colleague and I maintain in new research that firms must do the following:


Physical Identity and Access Management Software Can Address Many Challenges
Because of the intricacies involved – and also because of the inherent security concerns – many campuses are looking for a better way to manage these increasingly complex procedures using policy-based automation tools. In today’s education and healthcare environments these tools can increase consistency, reduce manpower related costs, provide better assurance of compliance and ultimately provide a more streamlined process along with an enhanced security environment.


How Software Defined Security Makes Compliance Auditing Easier
IT is flocking to the software-defined data center for cost-savings and agility. Software defined security offers the same benefits but is less well-known and subject to serious scrutiny. This talk will discuss the benefits of software-defined security to next-generation data center protection and compliance while noting the challenges to ITsec and auditors. Software-defined security: It's About Time (and Money)!


10 Myths about HIPAA’s Required Security Risk Analysis
With revamped HIPAA privacy and security rules now in effect that include higher emphasis on conducting a security risk analysis, the federalHealthIT.gov Web site dispels 10 pieces of misinformation about what the rules really require:


Rethink network design with next-gen network security architecture
In this video, Dave Shackleford discusses key initiatives and drivers for rethinking your current network security architecture. Some key points include traffic isolation and segmentation, sufficient security to ensure that the vast amount of data moving through channels is being protected, and software-defined networking, which could really transform network architecture and provide new ways to monitor traffic and perform isolation.


Addressing the Modern Challenges and Opportunities for Disaster Recovery
If done correctly, Disaster Recovery as a Service can decrease the time and effort it takes to store and retrieve data, and, in the event of a DR event, quickly reunite it with the systems businesses rely upon. Overall, it can often be cheaper. IT solutions and managed services provider Logicalis recently released a whitepaper (PDF) on the technologies that are making developing a DR plan “less scary.” What’s really scary, afterall, is that despite the options that exist, many businesses lack a DR plan.


Human Factors in ISMS: Goal Driven Risk Management
Driving forces are all forces that coerce for and elevate change. Senior management’s support and mandate is an evident example of driving forces (Marilynn and Bozak 2003). In contrast, the restraining forces are forces that functioning to hold back the driving forces and prevent a change from happening by creating obstacles and risks. For example, concerns over individual errors could be an obstacle in change goal ISMS strategy. Strengthening driving forces whilst the elimination of restraining forces, ensures succession of ISMS goals, which is preventing risks by providing cost effective control measures.



Quote for the day:

"Never forget to maintain stability while advancing, and never forget to advance while maintaining stability." -- Li Ka-Shing