Skip to content

Research Roundup: More Detail, Less Bono

Kapersky's ThreatPost for 2011 Overview.

The anguished cry of information security professionals.

Previously, I reviewed the Davos World Economic Forum Global Risks Report and its coverage of Cyber Security.  Shifting gears from canapés to crullers; reviewing Kapersky’s ThreatPost Security Spotlight Report for 2011, we get far more detail, which is to be expected.  The Wikileaks event plays a prominent role in this report as well.  Basically they confirm my hypothesis that this breach of executive privilege has provided the motivation to address information security concerns.  It has also pushed the concept of data security front and center in the business community. Kapersky also posits that Wikileaks and the issues surrounding Cablegate will continue to reverberate throughout 2011.   Of particular concern would be the ubiquitous availability of mobile devices and the role they may play in another “Wikileaks” event. Read more…

Research Roundup: Rootin’ Through the Data

Cyber Security and the Davos World Economic Forum

Does Your Inbox Feel Like This?

One of the biggest problems we face is information overload.  Our inboxes look like the warehouse from Raiders of the Lost Ark, Twitter releases a fire hose of information in our faces and then we have a stack of print publications teetering in the corner.

Seth Godin recently blogged about this very problem in a post titled “In and Out”.  Basically, you need to determine how much information you are going to take “in” before you actually produce something or “out”.

Well, I’m here to help with some of the clutter; at least on the cyber security front today.  A herd of security related reports were released this week and I’m going to provide an overview of each and link them all together over the next several posts. Read more…

Dr. House, EHR and Consulting: The Case of the Unpopular Mandate

EHR, HIPAA, HITECH and its Impact on Successful Implementations

Consulting and the Fictional TV Doctor.

At a high level, information technology professionals are like physicians.  They recommend new treatments (EHR software) to address conditions (HIPAA).  Unfortunately IT pros don’t get paid nearly as well, but at least we both worry about outsourcing to some degree.

The stereotype of the IT professional can also be compared to a doctor, or at least a fictional one, Dr. Gregory House.  Sullen, anti-social, with a high regard for his own knowledge, Dr. House avoids all contact with his customers (patients).  He only swoops in to provide a solution to a problem (condition) before he retreats once more to his solitude. Read more…

Consultant’s Angle: The Three P’s of Project Management

The Keystone to a Successful Project

Without the Keystone; a Jumble of Rocks.

As a consultant charged with a project at a new client, you don’t know what is going to clobber you as walk through the door that first day.  You may find your project team is exceedingly hostile, you sit three feet from the train tracks and rats will steal your lunch (a true client story).  But you can always rely on the fact that any project will encompass these three basic principles, Process, People and Prerequisites. Read more…

Communication is the Key to Security

Communication with Customers is Key in IT & Security

Burnish Your Communication Skills and Focus on the Business.

It may seem like an oxymoron but communication is the key to robust Information Security practices.  It is standard practice for security and IT professionals to communicate to their customers by proxy through strongly worded policies.  These policies are then enforced by Human Resources or Management.  Read more…

Reading the IT Employment Tea Leaves for 2011

It will take a bit of magic to boost the job market.

Tea leaf reading seems to be as accurate as other employment forecasting...

Janco Associates just released their 160 page IT salary survey for January 2011.  The report shows minuscule average compensation increases of .35%, which puts IT pros back to where they were in 2008.  These fractional percentages line up smartly with the overall IT employment growth of .17% between 2009 & 2010.  Also, IT professionals are being asked to shoulder more health care costs.  Companies are compensating for this increase by allowing employees flexible schedules and other low cost options.

According to the Janco survey, the IT outsourcing trend has peaked and layoffs have mostly subsided due to the last several years of relentless cost cutting.  Organizations are now looking to bring some IT operations back in-house due to contract management and due diligence based risks.  These operations have a high potential to be staffed by contract employees based on a report by Foote Partners.  As mentioned in the Foote report, Ninety-Five percent of IT jobs created since March 2010 have been for contractor and consulting services. Read more…

New Year = More Writing


2011 Goal: One Blog Post a Week

Over the last year I have exponentially increased my writing output.  I have blogged, written and contributed to articles throughout 2010.  However in 2011 I’m going to further step up my game.

As I have referenced in previous blog posts, Personal Branding should be key component of an IT professional’s marketing strategy.   Writing is one of the best ways to approach this goal.

So, as a personal goal for this year, I will be blogging at least once a week on topics I find interesting.  Some of the top consulting pros recommend blogging at least 3 times a week.  Then again, top consulting pros probably have better time management skills, something that is a definite work in progress for me.

May there be a prosperous 2011 for everyone.


Get every new post delivered to your Inbox.