Risk Management

Risk Management news, analysis, research, how-to, opinion, and video.

How do you know when you have all your requirements?
The road to a successful software deployment has many twists and turns

5 more tips

5 project management hacks for achieving project success

Five (more) tips to make your project experience more successful and a better experience for the team and customer.

risk

Is it Worth the Risk?

Stephen Gold discusses IT’s approach to “risk management” at CVS Health

csi cyber

Why your project needs a cyber risk management plan

Black hat hackers violate computer security for little reason beyond maliciousness or for personal gain. Are we training them with shows like CSI:Cyber? And what level of risk management will protect our projects?

Cracked piggy bank

12 ways to fix the traditional but broken software RFP selection process

The traditional RFP process fails to deliver consistent results when purchasing off-the-shelf or cloud enterprise software. This article examines problems with the RFP process specific to selecting software and suggests appropriate...

boardroom table

Cybersecurity on the agenda for 80 percent of corporate boards

Cybersecurity is a topic of discussion at most board meetings, according to a new survey of 200 corporate directors. The survey revealed that more than 80 percent of board members say that cybersecurity is discussed at most or all...

Mistakes

Employees know better, but still behave badly

Four out of five employees admitted to engaging in some risky behaviors while at work, even though they were aware of cyber-security dangers, according to a new global survey.

tight rope finance

Is there really a correlation between effective risk management and profit margin growth?

CSO explores the relationship between risks and profits and how enterprises can use information security risk management to increase profit margin growth.

cyber secuirty

The challenge of project risk management

Risk planning is critical, but it won't safeguard your project or your data or your customer from everything. Somethings you just can't plan for -- so you need to be ready to respond quickly and efficiently.

Startup Cyber adAPT takes on threat detection

Cyber adAPT, a startup springing from DARPA funded research, is shipping its first products that detect network compromises and gather data that can be used later for forensic analysis of breaches.

risk

Applying the Irari Rules to a risk-based security program

A few respected critics took issue with what we call the Irari Rules. Here’s why their concerns are off base.

Final checklist

3 ways to minimize enterprise software selection risk

While a data-driven software selection focuses on requirements, the demo, product audit and reference checks reduce project risks in other ways.

wtc 9 11

Risk management, 9/11, and where we are today

The 9/11 terrorist act on the World Trade Center towers and the Pentagon were almost unfathomable. But it happened and it changed the way we view the world and it changed the way we plan for risks - at least on a safety level. How...

just say no to the project

5 reasons you should turn down an IT project

Not all IT projects should be taken on. There are often good reasons to turn a project down. Being a smart project manager means knowing why and when to say no to a project.

project on track

Key steps to getting your IT project back on track

By knowing your project financials, meeting often and having detailed, useful status reports, you will get your project unstuck or keep it from getting derailed in the first place.

The costs of buying the wrong enterprise software

What a bad enterprise software purchase will cost you

If you fail to do the work upfront to select the best-fit enterprise software, you will pay the price.

Hard Truths of IT Security

Don’t count on people to prevent data breaches

As malware gets more sophisticated and hostile, columnist Rob Enderle says we can’t always count on people to do the right thing. He offers his plan to deal with the weak link.

cios execs security thinkstock

How to calm your board's nerves about cybersecurity

CIOs need to provide their companies' boards of directors with regular, easily understood briefings on data security, and steer the conversation toward the familiar ground of business risk management, says Editor in Chief Maryfran...

Project Management

How software evaluations can keep your project on budget and on time

An effective way to improve the accuracy of software implementation estimates is to use information collected when evaluating the selected product. Better estimates improve project management and reduce the risks of implementation...

Load More