Tag Archives: Security

Book Review: Information Technology Control and Audit Fourth Edition

Information Technology Control and Audit, Fourth Edition is one of a handful of books I think of as a must have reference book on every CIO’s bookshelf or in the IT department library. Now in its fourth edition, Information Technology Control … Continue reading

Posted in CIO Job, IT Risk Management, Reviews | Tagged , , , , , , , | 2 Comments

Cyber Security Awareness Month Planning

National Cyber Security Awareness Month is fast approaching and every CIO and CSO should already have their Cyber Security Awareness Month planning well underway. Just in case you haven’t begun your planning or you simply decided to dust off the tired … Continue reading

Posted in CIO Job, Privacy | Tagged , | Comments Off on Cyber Security Awareness Month Planning

Book Review: Information Security Governance Simplified

Information Security Governance Simplified: From the Boardroom to the Keyboard is a perfect guide to developing effective information security at all levels. The experienced and novice information security professional will find Information Security Governance Simplified, by Todd Fitzgerald, to be a valuable resource and … Continue reading

Posted in IT Risk Management, Reviews | Tagged , , , , , | 3 Comments

Case Study: Arkansas State University Privacy Policy and Web Trackers

This is a case study of the Arkansas State University privacy policy and the prevalence of web trackers on ASU websites. Although this case study is specific to Arkansas State University, the approach and tools used along with the findings presented here … Continue reading

Posted in Case Studies, Privacy | Tagged , , , , , , , , | 3 Comments

Facebook Like Button Violates University Privacy Policy

The Facebook Like button is on so many college or university websites even when the Facebook Like button violates most every college and university privacy policy. I realize your chief marketing officer, foundation director and director of alumni relations love the … Continue reading

Posted in Privacy | Tagged , , , , , , | 5 Comments

Behavioral Analytics: Politics and Technology of Hoodies and Profiling

Behavioral analytics and social media analytics technology is outpacing the policies and politics of hoodies and behavioral profiling. This is the long standing issue of what is IT’s role in administering acceptable use, crime prevention and the use of technology to enforce it. This … Continue reading

Posted in IT Governance, IT Risk Management, Privacy | Tagged , , , , | Comments Off on Behavioral Analytics: Politics and Technology of Hoodies and Profiling

Developing an Effective Cloud Computing Adoption Strategy (Part 2)

Developing an effective cloud computing adoption strategy is anchored in your philosophy about cloud computing and IT services. This posts builds upon  Developing an Effective Cloud Computing Adoption Strategy (Part 1) which focused more on the big picture of general purpose … Continue reading

Posted in Cloud Computing, IT Strategy | Tagged , , , , , , , , | 1 Comment