Article

Security and Risk Management: The Never-Ending Game of Chess

Posted December 1, 2005 | Leadership | Cutter Benchmark Review

Viruses, Trojan horses, worms, time bombs, adware, spyware, keystroke tracking tools, spoofing, snooping, sniffers -- these are some of the most popular examples of malicious code and techniques that modern organizations find themselves fighting. Couple this seemingly unabated tide of new releases and new forms of harmful software with human threats like crackers, thieves, industrial espionage contractors, and your own disgruntled or ill-intentioned employees, and what do you get? You get a complex cocktail of potential security headaches. How big a headache?

About The Author
Gabriele Piccoli
Gabriele Piccoli is a Fellow with Cutter Consortium, a member of Arthur D. Little's AMP open consulting network, and the Editor Emeritus of Cutter Benchmark Review. Dr. Piccoli is the Edward G. Schlieder Endowed Chair of Information Sciences at Louisiana State University's E.J. Ourso College of Business, and Director of the Digital Data Streams Lab. His consulting, research, and teaching expertise is in strategic information systems and the use… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.