6 min read
Independent Collaboration Part 2: A Framework for Outsourcing IT in Financial Institutions
This article is the second of a 2-part series on building an effective outsourcing strategy for the various components of IT for financial...
6 min read
This article is the second of a 2-part series on building an effective outsourcing strategy for the various components of IT for financial...
4 min read
It sounds like a total oxymoron: Independent Collaboration. On the Predictive Index, those two words are on opposing ends of the spectrum when it...
2 min read
You started with an Information Security Policy that covered the basics. Then one day an auditor walked in and asked to see your Data Destruction...
2 min read
Over the years, I have become wary of the term “best practice” when it is applied to technology and cybersecurity. The term “best practice” is...
3 min read
Several weeks ago, I was out with the rest of the Bedel Security staff on a strategic and team building exercise. During our meal we discovered a...
2 min read
When the Gramm-Leach-Bliley Act was implemented, each regulatory agency adopted a set of interagency guidelines and regulations required for...
3 min read
We are seeing findings related to change management cropping up in several audit reports this year. Appropriately scoping change management can be...
2 min read
One of the first things we do when working with a new client is to establish recurring monthly meetings with a set agenda for every meeting. Having...