The Need and Challenges of an International and National Approach to Cybersecurity

The growing complexity of the interconnectedness of physical and virtual infrastructure – servers, databases, microchips, cables, mobile phones, cars, machines and so on – through information and communication technology (ICT) are not only diffusing globally but are of concern to many. Beyond its impact on leadership, management or institutions, there is a common fear that this development offers more and more avenues for disruptions in the “digital supply chain” and thus increases the vulnerability of the information society and the global economy to system failure. Consequently, cyber threats have achieved an indisputable salience among government practitioners, business leaders and researchers alike. Read More

What does it take to make an organization “smart”?

The website “Answers.com” defines the word “smart” as “characterized by sharp, quick thought”. From the standpoint of those executives like the Chief Operations Officer, this definition means that all the required data to make a sharp, quick decision is at hand and organized to enable them to reach the right decision quickly. Read More

A Management View: Securing the Cloud

Cloud computing solutions are here to stay and continue to grow in any industry. At the same time, the debate on cloud (computing) security seems to be a never-ending story. In fact, security and data protection are always a key matter of interest for our clients when we try to help them with digital transformation. Time to take a look at the current state of the discourse and security measures from a management perspective. Read More

Your Digital Intimacy – Formerly Known as Digitalization

Digitalization – no other buzzword is used more loosely these days. From Insurance to Manufacturing, from Retail to Banking, from Healthcare to Transportation. Read More

2015 IT-Sicherheitsgesetz umgesetzt – und nun?

Am 17.12.2014 beschloss die Bundesregierung das IT-Sicherheitsgesetz. Es wird erwartet, dass es Mitte 2015 in Kraft tritt. Ziel des Gesetzes ist es, den Schutz der Verfügbarkeit, Integrität und Vertraulichkeit datenverarbeitender Systeme und eine Verbesserung der IT-Sicherheit bei Unternehmen mit kritischer Informationsinfrastruktur (KRITIS) sicherzustellen.

2015 – IT-Sicherheitsgesetz umgesetzt. Was nun?

Read More

Copyright 2015 21st CENTURY IT · RSS Feed · Anmelden