Security Approach – what matters

It is always with amusement that I receive offers of “free reviews” or “free assessment” when it comes to security. Invariably the company performing the assessment identifies a fatal flaw in the current architecture and does the Dick Cheney VP selection approach: they magically have the exact solution for the problem they identified and they […]

Cyber Security in the Wild

For something that was unheard of when Internet started (though viruses were there all along) to now having completely separate departments from IT with a C-level suite leader, this is quite a transformation in 25 years. There is a myriad of tools / techniques/ methodologies/ standards coupled with a larger myriad of vendors accomplishing from […]

Technology Strategy for Law firms

Law firms are very interesting organizations for a few reasons that make IT/ Technology strategy interesting. A law firm rarely has a clear hierarchical structure. The back-office side of the firm (“business administration”) tends to look like a “regular enterprise”, but the production side (practicing attorneys) tend to gravitate loosely around the managing partner, the […]

Vendor selection

A mandatory skill for any IT leader today is to know how to properly select a vendor. There are few projects/ services nowadays where internal resources, even with staff augmentation, can deliver the entire scope of a project/ service area. More often that not, nowadays cloud is the first choice. Vendor selection should be managed […]