1. CISOs Must Engage the Board About Information Security - CIO.com

    CISOs Must Engage the Board About Information Security - CIO.com

    With technology now at the center of nearly all business processes, information security is no longer simply an operational concern. It deserves a place on the board's strategic agenda. And that means the CISO needs to step up in the boardroom.

    Read Full Article
  1. Categories

    1. Segments:

      Client Accounting Services, Construction, Family Business, Healthcare, HNW/Individual, Investor Services, Manufacturing/Distribution, Not for Profit, Professional Services, Real Estate, Retail/Restaurant, Small Business, Strategic Growth Advisory, Technology, Transaction Services, Virtual Accounting Solutions
    2. Service Type:

      Audit, Corporate Tax, ERISA Audit, Estate and Tax Planning, Individual Tax, International Tax, IT Audit, Litigation Support, State and Local Taxes
    3. General:

      Global, Local Economy, Management, Politics, Revenue Recognition, Talent Management, Windham Brannon
    4. Internal:

      Marketing, Newsletter
    5. WB Author:

      Amber Brown, Barbara Coats, Brent Wilkinson, Carlye Dooley, Carolyn Riticher, Charles McGimsey, Cheryl Yarbrough, Courtnay Bazemore, Dean Flores, Denise Mummert, Donna Caruso, Doug Neal, Greg Spangler, Heidi LaMarca, Herb Barnes, John Carpentier, John Henriquez, Kerry Buchan, Kristi Johnson, Lee Hodges, Maggie Wise, Mary Beth Saylor, Matthew Levin, Nicholas Perrins, Nicole Suk, Rebecca Smith, Rebekah Judge, Richard Yelton, Tim Clancy, Tom Leahey, Valerie Barckhoff
  2. Quotes

    1. If the worst were to happen, could we honestly tell our customers, partners or regulators that we've done everything that was expected of us, especially in the face of some fairly hefty fines that could be levied by regulators.
    2. We're seeing, I think, not only that boards need to get up to speed on this, but also they need to be preparing their organization for the future.
    3. When boards and CISOs engage successfully, organizations are better able to take advantage of the opportunities presented by cyberspace and today's information technology while addressing the associated risk.
  3. Authors