Skip to content
  • About
  • Contact
  • 1.416.994.6552
Boardroom Metrics Logo Boardroom Metrics Logo Boardroom Metrics Logo
  • Start Here
  • Solutions
    • Governance Consulting and Evaluations
    • RFP Proposal Writing and Bid Management
    • Business Writing and Editing
    • Boardroom Metrics Consulting
  • Team
  • Inspiration
    • Blog
    • eBook Library
    • Podcast
    • Speaking

Risk of Incarceration: Cyber Security in the Boardroom

Brian Whitelaw2019-01-05T12:49:34-05:00August 10th, 2017|Board of Directors, Governance, Information Technology Security|

Why Boards must consider cyber security as part of corporate governance. For many years now, Information security, including Cyber Security, has been left to the IT Department. However, even if [...]

Read More

Top 5 Steps to Protect Personal Health Information (PHI)

Brian Whitelaw2019-01-05T12:49:34-05:00July 24th, 2017|Governance, Information Technology Security|

Many organizations have access to, or store PHI (Personal Health Information).  Not all of them are aware that they have legislated responsibilities to protect that personal information on behalf of [...]

Read More

Why The Difference Between Information Security and Information Privacy Matters

Brian Whitelaw2019-01-05T12:49:34-05:00July 19th, 2017|Business Management, Governance, Information Technology Security|

Information Security and Information Privacy are often confused with each other. It is important to understand the differences, and in some cases, the similarities. Information security vs. information privacy. Consider [...]

Read More

Five Steps to Protect Your Information Assets

Brian Whitelaw2019-01-05T12:49:35-05:00July 17th, 2017|Governance, Information Technology Security|

Protection from the Information Security bad guys. You know there is some nasty stuff out there on the Internet. You also know that your employees use company computers and networks [...]

Read More

Snowden, Security & Privacy

Brian Whitelaw2019-01-05T12:49:59-05:00November 4th, 2015|Information Technology Security, IT Planning, Technology|

In June of 2013, Edward Snowden leaked classified information from the National Security Agency (NSA). The leaked information revealed a number of surveillance programs that had been initiated by the [...]

Read More

Analyzing the Ashley Madison Data Breach

Brian Whitelaw2019-01-05T12:50:00-05:00August 26th, 2015|Information Technology Security, Technology|

Analyzing a Data Breach: Ashley Madison - the Good, the Bad, and of course the Ugly Recently, the Ashley Madison network was compromised, allegedly by a group known as the [...]

Read More

Governments are also Targets for Hackers

Brian Whitelaw2019-01-05T12:50:00-05:00August 19th, 2015|Information Technology Security, IT Planning, Technology|

Most of us are aware that Canadian, USA and other governments are under constant attack from other sovereign nations, usually for the purposes of obtaining military or economic information. Many [...]

Read More

Information Security – Separate or Integrate?

Brian Whitelaw2019-01-05T12:50:01-05:00August 11th, 2015|Information Technology Security, IT Planning, Technology|

You’ve decided you need to set up an Information Security group in your IT department, or perhaps you already have one but it is not performing to your expectations. One [...]

Read More

Information Security is really Risk Management. Change your Perspective

Brian Whitelaw2019-01-05T12:50:01-05:00August 4th, 2015|Information Technology Security, IT Planning, Risk Assessment, Technology|

Information Security in some organizations is considered to be a roadblock to doing business. In some cases, unfortunately, this has been true, and it’s because the business do not view [...]

Read More
12Next
  • Toronto Governance Consultant
  • RFP Proposal Writing and Bid Management
  • Business Writing and Editing
  • Boardroom Metrics Consulting
  • About
  • Blog
  • Contact
Copyright ©2021 Boardroom Metrics™ - Experience on Demand | Privacy Policy | Website Development by Dreiden
Twitter