Why combining IT and cybersecurity responsibilities in a leadership role is risky

AdobeStock 1615482170

Recently, LinkedIn suggested that I apply for the position of “Director of Global IT & Cyber Security”: a medium-sized company, multiple locations, well-known brand. Apart from the fact that I have enough to do at TEN Information Management, I took a look at the job description. Why? Because I hear from the organization that the […]

Bureaucracy, Part 748923: The difficulty of paying bills on time

1726813042344

As an entrepreneur, you know that when business isn’t going so well, outstanding payments can sometimes pile up. Most business partners pay after a friendly reminder, but sometimes you encounter absurd situations. I would like to tell you about one such situation today. In my opinion, it belongs in the category of bureaucracy that the […]

Overview of significant changes to ISO/IEC 27006-1:2024

1746184199323

The revision of ISO 27006 brings significant changes for ISMS audits according to ISO 27001—especially for digitized companies. I have looked into this and identified the following key points: New calculation logic for audit days Updated remote audit policies Simplified auditor qualification No rigid experience requirements: Quantitative requirements such as “four years of professional experience” […]

Vocabulary related to information security – a basic prerequisite for mutual understanding!

1746606632806

In practice and in marketing, misleading terminology is often encountered in connection with information security standards such as ISO 27001 and SOC 2. This imprecise use not only leads to misunderstandings, but can also undermine the trust of customers and partners. In the following, I will highlight typical misinterpretations and supplement them with further examples […]

The policy problem: Why nobody reads policies anymore – and how we can change that

1749066711797

The “policy problem” plagues many companies and has become an annoying reality: There are countless policies on almost every topic, but hardly anyone knows which ones are relevant to him or her. This is particularly fatal in the area of information security – things that can only be regulated organizationally fall “under the radar” of […]

ISO 42001: AI Risk Assessment vs. AI System Impact Assessment

1729124030349 1

AI Risk Assessment vs. AI System Impact Assessment: according to ISO 42001 ISO 42001, the international standard for AI management systems, requires organizations to conduct both an AI Risk Assessment and an AI System Impact Assessment. In this article, I would like to discuss the differences between these two assessments and which perspective each assessment […]

Pseudo-IT security – promoted and demanded by the CIO

1720291704492

I recently had an initial meeting with an interested party – a large medium-sized company from the manufacturing industry. The CIO reported that they had already implemented various IT security measures and now felt it was time to have their effectiveness reviewed by an independent body. The specific trigger was a recent ISO 27001 audit, […]