Information Risk Strategy
All documents are in PDF 1.4 format, compatible with Adobe Reader 5.0 and higher
Our response to the 2016 US Commission on Enhancing National Cybersecurity under Presidential Executive Order 13718
Our current reactive technocentric approach to security must change. In future the emphasis should be on resilience against generic classes of hazard.
Submission to EURIM on behalf of the BCS in respect of the small business security initiative.
There is a mismatch between roles and responsibilities in corporate information management as they are almost universally defined. This largely stems from the fallacious assumption that business information and IT are synonymous.
Catastrophic incidents often have numerous identifiably hazardous precursor events and conditions. If these are recognised and actively addressed in advance, the risk of extreme events can be reduced.
Comment on the 2011 Cabinet Office’s UK Cyber Security Strategy document.
There is a critical need for a strategy to improve standards of software development. Developer education is the key - only ‘secure programming’ should ever be taught.
An overview of the strategic considerations that underpin effective data backup practices.