This article was written by Jerome Barkate, Nakul Nair, Zane Van Dusen, and Scott Coulter. We are witnessing a remarkable period in the credit markets. Following years of accommodative monetary ...
Stanford Hospital & Clinics has released a new risk management methodology called value-driven enterprise risk management, according to a release from Stanford. Based on the new methodology, Stanford ...
The Group's Security Forum published the second report in a three-part series, yesterday. Called Technical Requirements for Risk Management Methodologies, it identifies the key characteristic that ...
In my courses on the management of information assurance (IA) I make a point of telling my students that as managers, we should always be prepared to answer the following two questions from upper ...
Agile boasts a collaborative structure, which naturally leads to greater transparency and communication for tech teams. By design, it has a short feedback loop compared to other methodologies. When ...
While teaching the military decision-making process (MDMP), I found plan­ners struggle with two unglamorous parts of it: risk management and course of action (COA) selection. And I can see why. Risk ...
It is frustrating to see the amount of budget allocated to compliance when you consider that most of the money goes to documenting security controls, not improving defenses. One of the biggest reasons ...
The increase in complex cyberattacks, along with mounting regulatory requirements, has prompted many organizations to install firewalls and intrusion-detection ...