Viktor on Digital Evolution

To content | To menu | To search

Thursday 9 February 2017

Published article: Data Owners Responsibilities When Migrating To The Cloud, ISACA journal, published in volume 6/2014

Co-author with Dr. Ed Gelbstein: Data Owners Responsibilities When Migrating To The Cloud, ISACA journal, published in volume 6/2014

Abstract: This article is intended as a complement to the well thought out, detailed and useful article “IT Security Responsibilities Change When Moving To The Cloud” by Larry Wlosinski (ISACA Journal, Volume 3, 2013 by bringing in the role of another major player: the data owner.

While the whole purpose of computing is to process data, data management, data quality and other aspects of data governance tend to get little attention by the I.T. community and best practices in these domains rely on the work of other professional bodies such as the Data Management Association, developers and publishers of the Data Management Body of Knowledge (DMBOK).

Link to the article

Published article: Ethical hacking: The next level or the game is not over, ISACA journal, published in volume 4/2014

Author: Ethical hacking: The next level or the game is not over, ISACA journal, published in volume 4/2014

Information security vendors have recognized the need to optimize the process of managing ethical hacking projects with the goal to reduce their costs. They start offering ethical hacking services in the form of Security as a Service (SecaaS) solutions. The ability to acquire ethical hacking security assessment for information systems with medium or even low business impact would allow organizations to build more complete and accurate risk treatment plan and optimize resources for information security management.

http://www.isacajournal-digital.org/isacajournal/2014_volume_4?pg=16#pg16

Published article: Glow in the dark – how CISOs can find their way through the darkness of the web, CSO Journal, 8 May 2014

Author: Glow in the dark – how CISOs can find their way through the darkness of the web, CSO Journal, 8 May 2014

From a small sushi shop to a large enterprise, hackers are looking for access to a company’s crown jewels: data. Web vulnerabilities are an easy route to this information. Viktor Polic explores how vulnerability scanners and ethical hackers help him to understand weaknesses in web applications

http://www.csoonline.com/article/2152541/data-protection/glow-in-the-dark-how-cisos-can-find-their-way-through-the-darkness-of-the-web.html

Published article: The quest for weak links in information security, CSO Journal, 12 November 2013

Author: The quest for weak links in information security, CSO Journal, 12 November 2013

Viktor Polic walks through the most effective ways for organizations to evaluate risk levels and assess vulnerabilities

http://www.csoonline.com/article/743085/the-quest-for-weak-links-in-information-security