an ISACA article

by Michael Werneburg
on 2017.05.18

You are here:
Risk topics
» Risk topics blog
April, 2018

March, 2018
· the planning fallacy

February, 2018
· Valentine's day vm backup plan

November, 2017
· the unsafe workplace and the body's response

October, 2017
· ISACA article is live

September, 2017
· published
· the Equifax breach
· Tracking Vulnerability Fixes to Production

August, 2017
· evaluating third party cyber risk

July, 2017
· getting it wrong with R
· de-identifying health information
· that's a lot of tracking!

June, 2017
· gaming Google news
· privacy in this day and age
· another record breach
· writing an industry standard
· ISACA article accepted

May, 2017
· Covey time-management quadrants
· safe harbor de-identification of health data
· an ISACA article

April, 2017
· my guide on managing third party risk
· PMP for five years
· metrics that matter
· 720 reads in 48 hours
· I lost my job

March, 2017
· farewell, SIRA board
· the message and the medium
· an interesting take on consulting


Tomorrow's the deadline for the next issue of ISACA's "Journal". I intend to submit a piece: my first. A bit of a right of passage perhaps, and probably one most submitters do long before this stage in their career I'm guessing.

The subject is getting the difficulties that technology service organizations can face in getting application vulnerabilities deployed to clients when those clients have priorities way above maintenance releases, no matter the rating of the vulnerability.

We'll see what happens.

big list