Risk Management

Risk Management news, analysis, research, how-to, opinion, and video.

too close darwin award
judges scorecard

Don’t gamble when prioritizing enterprise software projects.

Why you should always estimate ROI before buying enterprise software

Don’t gamble when prioritizing enterprise software projects. See why you should prioritize by ROI, and how to do it using the risk-adjusted value method.

overstimulated

Threat intelligence needs to grow up

Security teams are overwhelmed with a massive amount of threat data. While a decade ago no one was talking about threat intelligence except government agencies, organizations are now bombarded with threat data leaving them challenged...

Make time for vendor due diligence

Don’t skip vendor due diligence when buying enterprise software

It’s all too easy to skip vendor due diligence when buying enterprise software. This is an important part of the evaluation and selection process that can help avoid starting a business relationship with a vendor that just will not...

traffic freeway interchange

7 software strategies I learned while sitting in traffic

Software lifecycle management and freeway construction management share some common uncertainty and risks, but whether you're installing roads or software, you can manage by adopting these sound strategies.

cloud arrow

How the cloud will get you better IT uptime

Sometimes a catastrophic IT outage can be the catalyst for moving to the cloud.

How do you know when you have all your requirements?

How to know when you have all the requirements to properly select enterprise software

Any enterprise software selection project starts with a journey of discovery where you find out what your organization truly needs. But how do you know when you have reached the end of that journey and discovered all the requirements?...

The road to a successful software deployment has many twists and turns

Why selecting enterprise software is so difficult

The road to a successful cloud or COTS software deployment is full of twists and turns, more difficult than even many experienced IT professionals realize. Watch out for these common problems to minimize risks with your projects....

5 more tips

5 project management hacks for achieving project success

Five (more) tips to make your project experience more successful and a better experience for the team and customer.

risk

Is it Worth the Risk?

Stephen Gold discusses IT’s approach to “risk management” at CVS Health

csi cyber

Why your project needs a cyber risk management plan

Black hat hackers violate computer security for little reason beyond maliciousness or for personal gain. Are we training them with shows like CSI:Cyber? And what level of risk management will protect our projects?

Cracked piggy bank

12 ways to fix the traditional but broken software RFP selection process

The traditional RFP process fails to deliver consistent results when purchasing off-the-shelf or cloud enterprise software. This article examines problems with the RFP process specific to selecting software and suggests appropriate...

boardroom table

Cybersecurity on the agenda for 80 percent of corporate boards

Cybersecurity is a topic of discussion at most board meetings, according to a new survey of 200 corporate directors. The survey revealed that more than 80 percent of board members say that cybersecurity is discussed at most or all...

Mistakes

Employees know better, but still behave badly

Four out of five employees admitted to engaging in some risky behaviors while at work, even though they were aware of cyber-security dangers, according to a new global survey.

tight rope finance

Is there really a correlation between effective risk management and profit margin growth?

CSO explores the relationship between risks and profits and how enterprises can use information security risk management to increase profit margin growth.

cyber secuirty

The challenge of project risk management

Risk planning is critical, but it won't safeguard your project or your data or your customer from everything. Somethings you just can't plan for -- so you need to be ready to respond quickly and efficiently.

Startup Cyber adAPT takes on threat detection

Cyber adAPT, a startup springing from DARPA funded research, is shipping its first products that detect network compromises and gather data that can be used later for forensic analysis of breaches.

risk

Applying the Irari Rules to a risk-based security program

A few respected critics took issue with what we call the Irari Rules. Here’s why their concerns are off base.

Final checklist

3 ways to minimize enterprise software selection risk

While a data-driven software selection focuses on requirements, the demo, product audit and reference checks reduce project risks in other ways.

Load More