What started as computer security, morphed into information security, and is now being called “information assurance.” This includes the managing of all risks related to the use, processing, storage, and transmission of data, the systems and processes involved, and information in digital, analog, and physical forms. So, the game has changed in scope, scale, and complexity. But can a CIO truly delegate all this to his/her CISO and stop worrying?
view more