InfoWeek – Positive Security: Worth The Work?

Posted by & filed under IT Security, No Discussion Questions.

  Description: Positive security, in which it whitelists everything from entire applications down to specific functions before allowing access, sounds extreme. Unfortunately, the desktop environments we know and love prioritize ease of use over security, and we’re all feeling the pain: More than half of respondents to our 2008 InformationWeek Analytics Strategic Security poll have been hit… Read more »

How Stuff Works – Firewalls

Posted by & filed under IT Infrastructure.

            Description: Foundational information about how firewalls work. Source: Jeff Tyson, How Stuff Works Date: 10/24/2000 Link: http://www.howstuffworks.com/firewall.htm Discussion Questions: How effective are firewalls?

CompTIA – Security

Posted by & filed under IT Security, IT Standards.

              Description: In 2008, the average number of security breaches increased slightly from previous years. Although the number of security breaches remained moderate over the last few years, the data indicates the severity levels have increased. This suggests many organizations have made significant progress in dealing with security issues, but… Read more »

WordPress – The Top Business Issues facing CIOs / IT Directors – Results

Posted by & filed under IT Projects.

              Description: Graphical display of top IT issues for CIOs and IT Directors. Source: Peter Thomas Date: 3/17/2009 Link: http://peterthomas.wordpress.com/2009/03/17/the-top-business-issues-facing-cios-it-directors-results/ Discussion Questions: 1. CIOs who have a more strategic role are more successful in what core strategic activities?  Why are these critical success factors? 2. Oversees the IT division typically:… Read more »

PC World – Hacker Speak

Posted by & filed under IT Security.

                Description: Article with definitions of a hacker’s language important to internal security. Source: Andrew Brandt, PC World  Link: http://pcworld.about.com/news/Apr022001id44370.htm Discussion Questions: Do you believe that known hackers should be employed within organizations as security “officers” or gurus of security?

NewsWeek – Hunting the Hackers

Posted by & filed under IT Security.

       Description: Yahoo was under attack, the first of several in one week that would dramatically expose cyberspace’s dirty secret: though the Internet is an amazing creation that has boosted our economy and provided lots of cheeky Super Bowl ads, it is still a work in progress that can be knocked silly with… Read more »

CIO – Mistakes: Strategic Planning Don’ts (and Dos)

Posted by & filed under IT Planning.

      Description: CIO.com article about common mistakes related to strategic planning by IT professionals.  Source: Derek Slater, CIO Magazine Date: 6/1/2002 Link: http://www.cio.com/article/31106/Mistakes_Strategic_Planning_Don_ts_and_Dos_ Discussion Questions: 1. Discuss the importance of IT-business alignment for CIOs. 2. IT initiatives may fail if: a. IT is not aligned to the overall business strategy b. CIO is not a… Read more »

YouTube Video – The Cost, The Risk, The Value

Posted by & filed under IT Governance, Video.

Description: 7:36 minutes. YouTube video about the “governance,” or management, of information.  Many companies govern “money, finances, risks.”   This video presents argument about need for special, specific, different attention to the importance of controlling these assets; a context for what needs to be done. Source: YouTube Date: 10/23/2008 Link: http://www.youtube.com/watch?v=QkmRL5uriGA Discussion Questions: What is different about this… Read more »