an ISACA article

by Michael Werneburg
on 2017.05.18

You are here:
Risk topics
» Risk topics blog
October, 2017
· ISACA article is live

September, 2017
· published
· the Equifax breach
· Tracking Vulnerability Fixes to Production

August, 2017
· evaluating third party cyber risk

July, 2017
· getting it wrong with R
· de-identifying health information
· that's a lot of tracking!

June, 2017
· gaming Google news
· privacy in this day and age
· another record breach
· writing an industry standard
· ISACA article accepted

May, 2017
· Covey time-management quadrants
· safe harbor de-identification of health data
· an ISACA article

April, 2017
· my guide on managing third party risk
· PMP for five years
· metrics that matter
· 720 reads in 48 hours
· I lost my job

March, 2017
· farewell, SIRA board
· the message and the medium
· an interesting take on consulting

February, 2017
· the ever-expanding sh*tlist
· claiming professional expenses in Canada
· get cyber safe
· the flight of the wealthy

January, 2017
· virtual kidnapping
· financial industry vendor management

November, 2016
· securing your life
· yet another reason to patch

October, 2016
· DNS subdomain discovery
· fintech and information risk


more...

Tomorrow's the deadline for the next issue of ISACA's "Journal". I intend to submit a piece: my first. A bit of a right of passage perhaps, and probably one most submitters do long before this stage in their career I'm guessing.

The subject is getting the difficulties that technology service organizations can face in getting application vulnerabilities deployed to clients when those clients have priorities way above maintenance releases, no matter the rating of the vulnerability.

We'll see what happens.

current
big list
first