Browsing All posts tagged under »Surviving Cyber War«

Top PI Blog Posts Countdown No. 5: How Vulnerable Are We To A Cyberattack?

October 29, 2012


Editor’s Note: As we approach my 1,000th Procurement Insights blog post, over the next week I will be sharing with you the top 5 articles that garnered the most reads overall. Today’s submission, which ranked number 5 with 6,195 reads, was written on April 18th, 2010 as a follow-up to my interview with Richard Stiennon.  […]

Protecting your data in the cloud: Top cyber security expert Richard Stiennon weighs in on what you need to do to protect your most valuable asset – information

June 9, 2011


The other day I wrote a post titled While the fat versus thin debate is no longer relevant in the cloud, ownership of and accessibility to sensitive data is now the key consideration, in which I broached the subject of data security in the cloud, especially as it relates to unwanted government access to confidential information. […]

Roundtable on Outsourcing and Security in the Cloud just one highlight for eWorld 2010

September 10, 2010


The PI Window on Business Show is launching a busy Fall schedule which includes our 200th Episode Anniversary Special and Live Event Feeds from both London and Stockholm.  For those who did not have the opportunity to tune in to the broadcast, here is the link to our 100th Episode Special . The Live Event […]

What CXOs consistently fail to grasp about enterprise security

August 19, 2010


During eWorld I will be hosting a Roundtable discussion on Outsourcing focusing on key areas such as “Security in the Cloud.” Joining 30 plus year public sector veteran and the author of the seminal “Towards Tesco – improving public sector procurement” paper Colin Cram as a member of the guest panel will be Richard Stiennon. […]

Data Security: The Maginot Line of Contracting

July 23, 2010


“For those of us in contracting, we spend hours crafting clauses and negotiating terms which are mostly of limited honesty or meaning. Is this because we really don’t care, or because we are blissfully unaware of the truth? Companies simply cannot promise complete security of data or information management. It is an area of relative […]

Security in the Cloud and other (unscripted) musings from leading industry experts

July 13, 2010


In yesterday’s post “Calculating Digital Capital and what it means to traditional ERP vendors” I had referenced an article by DK Matai that appeared in the July 12th edition of the Huffington Post. Titled “Digital Capital and Cloud Computing’s Asymmetric Risks,” I focused predominantly on the Digital Capital aspect of Matai’s musings as it related to […]

Guest Post: Carl Levin poses three cyber scenarios

April 24, 2010


The following is a guest post by Richard Stiennon who will be my guest on the May 7th, 2010 PI Window on Business segment “Surviving Cyber War” on Blog Talk Radio at 12:30 PM EST. Note: This is the second guest post by Richard in the Procurement Insights Blog.  The first “Look to how the […]

Guest Post: Look to how the Cold War was won, not how it was maintained, for a cyber strategy

April 21, 2010


The following is a guest post by Richard Stiennon who will be my guest on the May 7th, 2010 PI Window on Business segment “Surviving Cyber War” on Blog Talk Radio at 12:30 PM EST. Note: A second guest post by Richard through the Procurement Insights Blog will appear here on Friday, April 23rd. Perhaps […]

How Vulnerable Are We To A Cyberattack?

April 18, 2010


Because the United States is the most Internet-dependent and automated in terms of supply chain, banking, transportation-control systems and other modern facilities, it’s also the most vulnerable to cyberattack, Clarke argues. And the military’s dependence on the Internet also means it would be vulnerable to disruptions of it. From Fox Business “Cyber War”‘ author: U.S. […]