Results for

Sort by:
  • Blog
    May 2, 2016
    May is International Internal Audit Awareness Month. We are celebrating with a series of blog posts focused on internal audit topics and the daily challenges and future of the internal audit profession.   In the tenth year of our Internal Audit Capabilities and Needs Survey, we believe internal audit has arrived at a tipping point. The issue is no longer whether or not your function is…
  • Blog
    May 6, 2016
    May is International Internal Audit Awareness Month. We are celebrating with a series of blog posts focused on internal audit topics and the daily challenges and future of the internal audit profession.   We issued our IT Audit Benchmarking Survey Report at the end of last year, and we discussed IT audit best practices in a December 9 webinar with our own IT audit practice leader, David…
  • Blog
    February 9, 2022
    SAP Business Objects, often referred to within the SAP ecosystem as BOBJ, is one of the most evolved and reliable analytics and reporting engines running today. With over 60,000 BOBJ installations, the solution can be found in companies of all sizes in every industry around the world. Founded in 1990 and acquired by SAP in 2007, Business Objects is still primarily located in on-premise servers…
  • Blog
    February 8, 2022
    Vulnerability management is a discipline that many organizations struggle with due to one simple factor: complexity. Today, organizations manage environments with technology that changes at an ever-increasing speed while relying upon legacy systems to support key business processes. In response to this complexity challenge, cybersecurity professionals continue to create new vulnerability…
  • Blog
    January 31, 2022
    In December 2021, in my role as president of the ISSA Delaware Valley Chapter, I had the honor of hosting a panel with five Chief Information Security Officers (CISOs), representing five different industries, each facing unique challenges presented by the global COVID-19 pandemic. The panelists included: Robert Younce - CISO of Mannington Mills, one of the world's leading manufacturers of fine…
  • Blog
    January 10, 2022
    Do your homework. The age-old mandate has newfound relevance for CISOs, given the intense pace of mergers and acquisitions (M&A) and escalating cybersecurity risks. Global business consolidation activity is strong. The number of deals (and the combined value of those transactions) through the first three quarters of 2021 surpassed the number of deals (and the combined value of those…
  • Blog
    January 26, 2022
    What is Log4Shell? On December 10, 2021, a vulnerability known as Log4Shell (CVE-2021-44228) was disclosed, related to a popular Java logging library (log4j). Log4Shell gained a lot of attention due to how simple it is to exploit, how pervasive Log4j is, and the potential level of access it can provide. Within a few days of being released, many companies discovered vulnerabilities in their…
  • Blog
    January 18, 2022
    Throughout my career as both a CISO and a consultant serving CISOs in companies around the globe, I’ve learned that Chief Information Security Officers, regardless of their current title, reporting structure or how they got to the role, share many things in common; one of which being, they love to talk about their experiences. Recently, we gathered three of the most experienced CISOs I know to…
  • Blog
    February 16, 2022
    Take a moment to consider your favorite relationship. What makes it special? Most likely, one of the first qualities that comes to mind is that a strong level of trust has been built. Just like in interpersonal relationships, trust is also a critical component for consumers when deciding how and with which businesses they will interact. This is especially prevalent when it comes to their digital…
  • Blog
    February 17, 2022
    For years, we've known that Internet of Things (IoT) devices can come under attack as quickly as within five minutes of being connected to the internet. These events predominantly include large-scale scanning techniques to exploit IoT devices that are vulnerable to basic attacks such as default credentials. Historically, hackers have used these attacks to create a network of devices to perform a…
Loading...