Archive for 'Tools' Category
The Difference Between Patch and Vulnerability Management
By Vigilize - Last updated: Thursday, January 18, 2018
The first in our guest author series, this article by Eric Kroeger and Jason Mikolanis explains the difference between patch and vulnerability management.
Small Business Resource Page
By Dan Hadaway - Last updated: Friday, August 25, 2017
Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).
Consumer Breach Resources
By Vigilize - Last updated: Sunday, April 12, 2015
Think you’ve been hacked? These are sites to start your breach investigation.
Enterprise Risk Management Committee Charter
By Vigilize - Last updated: Friday, February 13, 2015
Quick and Easy ERM Committee Boilerplate! This is a starting point for those wanting to establish an Enterprise Risk Management Committee. (It can also be used as the structure for an ISO Committee Charter, as well as a Audit Committee Charter.) The boilerplate charter is meant to establish the Enterprise Risk Management Committee, its membership, […]
Turn Lemons into Lemonade with Proactive Incident Responses!
By Vigilize - Last updated: Saturday, August 23, 2014
Incident Response is a key to IT Governance. A good Incident Response Program will have a high-level policy, and a plan that enforces that policy by establishing goals, priorities, training, and tools.
Security Takes Cooperation
By Vigilize - Last updated: Friday, August 22, 2014
Security Takes Cooperation! To help you remind your employees that security requires cooperation, here’s a security awareness reminder poster that you may print and post in conspicuous locations: security_takes_cooperation_082414 !
Vendor Management 2014
By Dan Hadaway - Last updated: Tuesday, July 8, 2014
Mark your calendars! Dan Hadaway will be delivering a workshop with the Indiana Bankers Association to outline what makes an effective vendor management program. The workshop will be on August 21st starting at 9:00 AM and ending at 4:00 PM. For information on how to register, visit the IBA’s website. Sharpening Your Vendor Management Tools Because financial […]
The Bitcoin Protocol Explained
By Vigilize - Last updated: Tuesday, December 10, 2013
You may have read articles around the web claiming to know the future of the controversial digital currency known as Bitcoin.
Vendor Risk, The TSP Booklet, and the ROE
By Dan Hadaway - Last updated: Friday, November 2, 2012
This article attempts to concisely describe the important points of the TSP Booklet, and makes the case that you should add the Report of Examination to your vendor due diligence tools!
Using SDelete
By Vigilize - Last updated: Tuesday, July 10, 2012
SDelete allows you to delete one or more files and/or directories, or to cleanse the free space on a logical disk. It is a command line utility that takes a number of options. SDelete accepts wild card characters as part of the directory or file specifier. Instructions on how to use SDelete.
The first in our guest author series, this article by Eric Kroeger and Jason Mikolanis explains the difference between patch and vulnerability management.
Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).
Consumer Breach Resources
By Vigilize - Last updated: Sunday, April 12, 2015
Think you’ve been hacked? These are sites to start your breach investigation.
Enterprise Risk Management Committee Charter
By Vigilize - Last updated: Friday, February 13, 2015
Quick and Easy ERM Committee Boilerplate! This is a starting point for those wanting to establish an Enterprise Risk Management Committee. (It can also be used as the structure for an ISO Committee Charter, as well as a Audit Committee Charter.) The boilerplate charter is meant to establish the Enterprise Risk Management Committee, its membership, […]
Turn Lemons into Lemonade with Proactive Incident Responses!
By Vigilize - Last updated: Saturday, August 23, 2014
Incident Response is a key to IT Governance. A good Incident Response Program will have a high-level policy, and a plan that enforces that policy by establishing goals, priorities, training, and tools.
Security Takes Cooperation
By Vigilize - Last updated: Friday, August 22, 2014
Security Takes Cooperation! To help you remind your employees that security requires cooperation, here’s a security awareness reminder poster that you may print and post in conspicuous locations: security_takes_cooperation_082414 !
Vendor Management 2014
By Dan Hadaway - Last updated: Tuesday, July 8, 2014
Mark your calendars! Dan Hadaway will be delivering a workshop with the Indiana Bankers Association to outline what makes an effective vendor management program. The workshop will be on August 21st starting at 9:00 AM and ending at 4:00 PM. For information on how to register, visit the IBA’s website. Sharpening Your Vendor Management Tools Because financial […]
The Bitcoin Protocol Explained
By Vigilize - Last updated: Tuesday, December 10, 2013
You may have read articles around the web claiming to know the future of the controversial digital currency known as Bitcoin.
Vendor Risk, The TSP Booklet, and the ROE
By Dan Hadaway - Last updated: Friday, November 2, 2012
This article attempts to concisely describe the important points of the TSP Booklet, and makes the case that you should add the Report of Examination to your vendor due diligence tools!
Using SDelete
By Vigilize - Last updated: Tuesday, July 10, 2012
SDelete allows you to delete one or more files and/or directories, or to cleanse the free space on a logical disk. It is a command line utility that takes a number of options. SDelete accepts wild card characters as part of the directory or file specifier. Instructions on how to use SDelete.
Think you’ve been hacked? These are sites to start your breach investigation.
Quick and Easy ERM Committee Boilerplate! This is a starting point for those wanting to establish an Enterprise Risk Management Committee. (It can also be used as the structure for an ISO Committee Charter, as well as a Audit Committee Charter.) The boilerplate charter is meant to establish the Enterprise Risk Management Committee, its membership, […]
Turn Lemons into Lemonade with Proactive Incident Responses!
By Vigilize - Last updated: Saturday, August 23, 2014
Incident Response is a key to IT Governance. A good Incident Response Program will have a high-level policy, and a plan that enforces that policy by establishing goals, priorities, training, and tools.
Security Takes Cooperation
By Vigilize - Last updated: Friday, August 22, 2014
Security Takes Cooperation! To help you remind your employees that security requires cooperation, here’s a security awareness reminder poster that you may print and post in conspicuous locations: security_takes_cooperation_082414 !
Vendor Management 2014
By Dan Hadaway - Last updated: Tuesday, July 8, 2014
Mark your calendars! Dan Hadaway will be delivering a workshop with the Indiana Bankers Association to outline what makes an effective vendor management program. The workshop will be on August 21st starting at 9:00 AM and ending at 4:00 PM. For information on how to register, visit the IBA’s website. Sharpening Your Vendor Management Tools Because financial […]
The Bitcoin Protocol Explained
By Vigilize - Last updated: Tuesday, December 10, 2013
You may have read articles around the web claiming to know the future of the controversial digital currency known as Bitcoin.
Vendor Risk, The TSP Booklet, and the ROE
By Dan Hadaway - Last updated: Friday, November 2, 2012
This article attempts to concisely describe the important points of the TSP Booklet, and makes the case that you should add the Report of Examination to your vendor due diligence tools!
Using SDelete
By Vigilize - Last updated: Tuesday, July 10, 2012
SDelete allows you to delete one or more files and/or directories, or to cleanse the free space on a logical disk. It is a command line utility that takes a number of options. SDelete accepts wild card characters as part of the directory or file specifier. Instructions on how to use SDelete.
Incident Response is a key to IT Governance. A good Incident Response Program will have a high-level policy, and a plan that enforces that policy by establishing goals, priorities, training, and tools.
Security Takes Cooperation! To help you remind your employees that security requires cooperation, here’s a security awareness reminder poster that you may print and post in conspicuous locations: security_takes_cooperation_082414 !
Vendor Management 2014
By Dan Hadaway - Last updated: Tuesday, July 8, 2014
Mark your calendars! Dan Hadaway will be delivering a workshop with the Indiana Bankers Association to outline what makes an effective vendor management program. The workshop will be on August 21st starting at 9:00 AM and ending at 4:00 PM. For information on how to register, visit the IBA’s website. Sharpening Your Vendor Management Tools Because financial […]
The Bitcoin Protocol Explained
By Vigilize - Last updated: Tuesday, December 10, 2013
You may have read articles around the web claiming to know the future of the controversial digital currency known as Bitcoin.
Vendor Risk, The TSP Booklet, and the ROE
By Dan Hadaway - Last updated: Friday, November 2, 2012
This article attempts to concisely describe the important points of the TSP Booklet, and makes the case that you should add the Report of Examination to your vendor due diligence tools!
Using SDelete
By Vigilize - Last updated: Tuesday, July 10, 2012
SDelete allows you to delete one or more files and/or directories, or to cleanse the free space on a logical disk. It is a command line utility that takes a number of options. SDelete accepts wild card characters as part of the directory or file specifier. Instructions on how to use SDelete.
Mark your calendars! Dan Hadaway will be delivering a workshop with the Indiana Bankers Association to outline what makes an effective vendor management program. The workshop will be on August 21st starting at 9:00 AM and ending at 4:00 PM. For information on how to register, visit the IBA’s website. Sharpening Your Vendor Management Tools Because financial […]
You may have read articles around the web claiming to know the future of the controversial digital currency known as Bitcoin.
Vendor Risk, The TSP Booklet, and the ROE
By Dan Hadaway - Last updated: Friday, November 2, 2012
This article attempts to concisely describe the important points of the TSP Booklet, and makes the case that you should add the Report of Examination to your vendor due diligence tools!
Using SDelete
By Vigilize - Last updated: Tuesday, July 10, 2012
SDelete allows you to delete one or more files and/or directories, or to cleanse the free space on a logical disk. It is a command line utility that takes a number of options. SDelete accepts wild card characters as part of the directory or file specifier. Instructions on how to use SDelete.
This article attempts to concisely describe the important points of the TSP Booklet, and makes the case that you should add the Report of Examination to your vendor due diligence tools!
SDelete allows you to delete one or more files and/or directories, or to cleanse the free space on a logical disk. It is a command line utility that takes a number of options. SDelete accepts wild card characters as part of the directory or file specifier. Instructions on how to use SDelete.