Real talk in cybersecurity

Versus excel spreadsheet lists

Melanie Wijeratna
Blue Star Ink

--

Photo by FUJIDUDEZ on Unsplash

Outsourcing is common, both onshore and offshore, as companies focus on core competencies and ways to cut costs. From an information security point of view, these arrangements can present risk that may be difficult to quantify and potentially difficult to mitigate (ISACA).

--

--

Melanie Wijeratna
Blue Star Ink

I am a Certified Information Security Manager (CISM) and a PROSCI-certified People Change Manager. I’m also an ultra-runner and have lived and worked all over.