#45 – HOW SECURE ARE YOUR AUDITS? – UMBERTO TUNESI

Umberto Tunesi pixThere’s a mighty black and white, six minutes long documentary film enclosed to the italian progressive rock band PFM / Premiata Forneria Marconi Stati di Immaginazione (States of Imagination) music album.  Its title is La Conquista (The Conquest), it shows how a savage Indios tribe succeeds in building, with very poor means, a bridge crossing a very dangerous river, to ensure its survival. Continue reading

#45 – SUBCONTRACTOR WIN-WINS – JOHN AYERS

John Ayers pixYou have heard it said dozens of times.  We want a win-win situation with our subcontractors.  I have an example of a win-win subcontractor experience that worked well and one example of one that did not turn out very good.  Hopefully these examples will give you some insight into what is meant by win-win and now to make it happen. Continue reading

#45 – MAKING DECISIONS THAT WORK FOR YOU! – ED PERKINS

OLYMPUS DIGITAL CAMERAThere is a lot of literature written on decision making, ‘how to’, best practices, process, factors and so to follow to make ‘good’ decisions.  We have been exploring ‘risk based’  decision making in these blogs.  We have looked at factors, process, frameworks, psychology and bias.

But we have not discussed perhaps the most important aspect of any decision – implementation or that double edged word ‘execution.’  (Of course this assumes that the decision maker wants something to actually happen as a result of the decision, but that is a topic for another day).

Let’s use the nicer word – Implementation – which implies there is a course of ACTION, with a timeframe for results to be produced or to occur. Continue reading

#45 – IS YOUR PERSONAL INFORMATION SAFE? – CAROLYN TURBYFILL

Carolyn Turbyfill Ph.D.

Carolyn Turbyfill Ph.D.

In the last 6 months, I have been notified by 3 different vendors:  Adobe, Target and University of Maryland University College, of 4 data breaches.

Three of the breaches involved consumer data theft that may have or provably have compromised some of my private information:  i.e. Login credentials; credit card.   The amount of time between the breach and the notification of potentially affected parties has varied between 4 days and 7 weeks. Continue reading

#44 -WHAT COULD GO WRONG? – JOHN MILLICAN

John Millican pixWhat could go wrong?  As an information security manager, I have often been asked that question.  But, there are two ways it is asked.

The first is my preferred way.  It is a genuine effort to identify and evaluate the risk associated with the item at hand.  That is a conversation I want to have.  That is a thought process I want to encourage. Continue reading