trusteconomics.wordpress.com
Computer Weekly’s “Security Trends for 2009” | Trust Economics
https://trusteconomics.wordpress.com/2009/01/28/computer-weeklys-security-trends-for-2009
Economically justified security investments. Computer Weekly’s “Security Trends for 2009”. January 28, 2009. Posted by separkin in News - Reports. Computer Weekly’s Security Trends for 2009. Article discusses a number of information security threats that require greater attention in 2009 due to the use of ever more flexible data-sharing practices within the workplace. As an example, Daniel Dresner of the National Computing Centre (NCC). Is quoted as saying:. 8220;human firewall”. Essentially where an out...
trusteconomics.wordpress.com
Cases seen of staff being denied pay for computer boot-up time | Trust Economics
https://trusteconomics.wordpress.com/2008/11/20/cases-of-staff-being-denied-pay-for-computer-boot-up-time-on-the-rise
Economically justified security investments. Cases seen of staff being denied pay for computer boot-up time. November 20, 2008. Posted by separkin in News. An article in the US National Law Journal. No comments yet — be the first. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. You are commenting using your Twitter account. ( Log Out.
trusteconomics.wordpress.com
Charles Cresson Wood talks to ThreatChaos about the future of information security policies | Trust Economics
https://trusteconomics.wordpress.com/2008/11/13/charles-cresson-wood-talks-to-threatchaos-about-the-future-of-information-security-policies
Economically justified security investments. Charles Cresson Wood talks to ThreatChaos about the future of information security policies. November 13, 2008. Posted by separkin in News. Prominent information security specialist Charles Cresson Wood. Recently talked to ThreatChaos. No comments yet — be the first. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). Notify me of new comments via email.
trusteconomics.wordpress.com
Incorporating “User Frustration” into Calculations of Return on Security Investment (ROSI) | Trust Economics
https://trusteconomics.wordpress.com/2009/08/22/incorporating-user-frustration-into-calculations-of-return-on-security-investment-rosi
Economically justified security investments. Incorporating “User Frustration” into Calculations of Return on Security Investment (ROSI). August 22, 2009. Posted by separkin in Blog. A recent post by Alex Hutton. 8220;is security seamless, or does it roadblock getting business done? Here, an individual within an organisation may have their own perceived costs and benefits of adherence to the organisation’s security policies. Costs may be in terms of the time taken to adhere to a particular proce...Fill in...
trusteconomics.wordpress.com
About | Trust Economics
https://trusteconomics.wordpress.com/about
Economically justified security investments. Trust Economics is a research project, which is conducted jointly by Hewlett-Packard, Merrill-Lynch, Newcastle University, University College London and University of Bath. Its objective is to device methodology that allows companies to make decisions about security investments based on costs and benefits for the company. More information about the project can be found at http:/ www.trust-economics.org. No comments yet — be the first.
trusteconomics.wordpress.com
ISC2 Blog Entries Discuss the Need to Expand Information Security Management Knowledge to include Human Factors | Trust Economics
https://trusteconomics.wordpress.com/2009/08/22/isc2-blog-entries-discuss-the-need-to-expand-information-security-management-knowledge-to-include-human-factors
Economically justified security investments. ISC2 Blog Entries Discuss the Need to Expand Information Security Management Knowledge to include Human Factors. August 22, 2009. Posted by separkin in Blog. An entry in the ISC2 blog. Discusses whether the foundation for the Certified Information Systems Security Professional (CISSP). As mentioned in the blog), where they take action proportionate to their own perception of a threat, where this action may not necessarily be the most appropriate response. ...
trusteconomics.wordpress.com
Security Experts Discuss ‘Conventional Wisdom’ | Trust Economics
https://trusteconomics.wordpress.com/2008/11/12/security-experts-discuss-conventional-wisdom
Economically justified security investments. Security Experts Discuss ‘Conventional Wisdom’. November 12, 2008. Posted by separkin in News. A recent Network World article. Rounds up a number of experts from the field of information security to discuss some of the prevailing beliefs that they encounter. The article covers a series of interesting topics, such as regulatory compliance (. 8220;You can be extremely secure but not compliant. Just as you can easily be compliant but not secure.”. You are comment...
trusteconomics.wordpress.com
Trust Economics | Economically justified security investments | Page 2
https://trusteconomics.wordpress.com/page/2
Economically justified security investments. UK ICO warns that “information can be a toxic liability”. October 29, 2008. Posted by separkin in News. The Office of the UK Government’s Information Commissioner. Has released a press release. To coincide with a speech. Given by Information Commissioner Richard Thomas. The speech highlights some views towards the handling of personal data within organisations. Two opinions expressed by Mr. Thomas are especially pertinent to Trust Economics:. October 23, 2008.
trusteconomics.wordpress.com
Demos Report Highlights the Value of Social Networking for Businesses | Trust Economics
https://trusteconomics.wordpress.com/2008/10/30/demos-report-highlights-the-value-of-social-networking-for-businesses
Economically justified security investments. Demos Report Highlights the Value of Social Networking for Businesses. October 30, 2008. Posted by separkin in News - Reports. A recent BBC article. Discusses the ‘Network Citizens’ report. Published by the Demos. Thinktank) about the value of allowing social networking applications to operate within a business environment. 8220;must be tied to a business goal”. With regards to information security management, Mr. Bradwell comments that:. 8220;In today’s...
SOCIAL ENGAGEMENT