Articles

Welcome to our articles page. You will find articles on various aspects of Information Security and Business Continuity promulgated here. This is done on an ongoing basis for free of cost for your education. We emphasize your cooperation to refrain from redistributing our content for commercial purposes without our prior written consent. However, you are free to use it for your personal (educational and research) purposes or to implement a certain roadmap or strategy in your organization.

 

We partner with CyAlpha — a Calgary-based Cyber consulting firm, to offer you the above services.


Software Development, Core Series Rhonald John Rose Software Development, Core Series Rhonald John Rose

Software development for non-technical founders: a blueprint for your journey

In this article, we discuss the high-level blueprint for your journey in developing your product in the right way. First, we start with the overview of our blueprint before discussing each component briefly in the subsequent articles. Also, we discuss some terminologies that you should be aware of when building your ideal development or engineering team.

Read More
Software Development, Core Series Rhonald John Rose Software Development, Core Series Rhonald John Rose

Software development for non-technical founders: Overview

In this short series, we explore some of the complexities, pitfalls, provide some guidance on where to start, and explain different terminologies that need to be learned by the non-technical startup founders. Although we touch on ideation and validation of startup ideas, we will focus more on software development from a startup perspective.

Read More
IT Disaster Recovery Plan, Core Series Rhonald John Rose IT Disaster Recovery Plan, Core Series Rhonald John Rose

Developing IT Disaster Recovery Plan: Documenting and operationalizing your strategy

In the last article, we discussed testing your IT Disaster Recovery strategy in detail. In addition, we discussed setting test objectives, selecting the testing method, and preparing and facilitating the testing.

In this article, we discuss documenting, presenting your strategy for approval, and operationalizing it.

Read More
InfoSec Strategy, Core Series Rhonald John Rose InfoSec Strategy, Core Series Rhonald John Rose

Developing Information Security Strategy: Discussing and concluding

This article concludes our InfoSec strategy series. In the DISCUSS, AGREE, and FINALIZE phases of your security strategy development, the focus is to gain widespread acceptance so that you can confidently begin implementation. This is achieved by presenting the strategy to specific segments of your organization and then tweaking as necessary. Once the strategy is approved, it’s time to develop the implementation roadmap for the year’s strategy or specific programs. And just like that, your entire organization will have peace of mind that its information is safe.

Read More
InfoSec Strategy, Core Series Rhonald John Rose InfoSec Strategy, Core Series Rhonald John Rose

Developing Information Security Strategy: Define your solutions, Part 2

Continuing from where we left off in the previous article, we discuss the DEFINE phase's remaining four goals.

Referencing your corporate goals is an important part step towards developing an effective InfoSec strategy. Once the alignment is satisfactory, you need to document the strategy for discussion. This strategy is not final since it should be discussed with your stakeholders before implementation. You should avoid providing concrete timelines for your strategy and instead adopt maturity levels. Furthermore, consulting with potential vendors will help you determine a realistic budget. When the strategy is approved, the programs will have a definite timeline and fine-tune the budget.

Read More