Category: Information Technology Risks

Digital risks and Cyber risks -are they the same?

There are many definitions floating around digital risk management and cyber security risk management. The words “digital risks” and “cyber risks” are sometimes loosely used as synonyms by many. Here are my thoughts and perspectives on the understanding of these terms: Digital risks are those risks involved in adopting Digital initiatives or bringing in “digital…

Read the full article

Is your information really secure?

Cyber security risk management is no longer confined to solid firewalls and state of the art Virtual Private Networks. A video that recently caught my attention may make you re-think cyber security programs that you have (or intend to have). Have a look …. Video credit: CNA Insider. //spotyourrisks.com/admin/wp-content/uploads/2019/12/VID-20191223-WA0000.mp4 Here are factors that one should…

Read the full article

My take on IRM and GRC

The next buzzword after GRC (Governance, Risk and Compliance) is now IRM (Integrated Risk Management). (Not to be confused with another acronym “IRM” which denotes “Information Rights Management” which is a form of IT security technology for protecting access to sensitive documents and emails.) Why are we emphasizing so much on new acronyms and confuse…

Read the full article

A Primer on AI/ML/DL/NN etc.

Today, many of us non-technical people feel quite left out of conversations that are buzzing around in companies, social media, webinars, presentations, etc. Yes – I am talking about the most talked about acronyms – Artificial Intelligence (AI), Machine Learning (ML), Deep Learning (DL), Neural Networks (NN) and so on that also includes Big Data,…

Read the full article

Information Security

What is the best practice approach that can help create a solid framework for establishing Information Security policies, procedures and practices? One needs to recognize the various aspects of information security as enunciated in COBIT and other world-wide standards and understand the impact of data privacy laws on information security. Information security is the practice…

Read the full article

High level overview of IT risks

This is a huge and on going topic – fundamentally because of the rapid innovations that are happening in the technology space. The word “information technology” as we understand today (to name a few) encompasses hardware resources, networks, operating systems, virtualization, software engineering, business applications, artificial intelligence (AI), robotics, cloud computing, etc. New and innovative…

Read the full article