articles.

publications

ISACA

In 2017, my first published peer-reviewed journal article appeared in ISACA's "Journal". An introductory blog article appears here while the actual Journal article is available by permission here.

IIAC

Also in 2017, I co-authored a guide for investment firms on the evaluation of cyber security readiness in industry vendors. This is proprietary to the Investment Industry Association of Canada, but I can make this available upon request depending on the circumstances.

Masters dissertation

In 2014, I completed a masters degree in risk management with Birmingham City University by completing a study of seven technology vendors in regulated industries across North America. I was attempting to understand whether implementing a risk management function at a technology vendor in a regulated industry would help the vendor improve the overall delivery of its service. That turned out to be the case, but the study found that the #1 impact was actually in sales and marketing! If you like to read thousands of words, I've got some here.

articles

Over the years, I've written articles once my own research into a particular matter seemed to bear something worth sharing. Some are now a bit dated–for instance I've come to the view that catalogs of internal controls are potentially counter-productive to IT risk management–but that just gives me an opportunity to write some more articles!

when you have to lay off your team

2019.11.01

I've recently had to lay off my team at a early-stage start-up. Here's how I handled it.

a non-profit risk management process manual

2019.07.22

Non-profits require processes monitoring the enterprise for loss, including missed opportunity. I have written a manual for doing so that avoids common pitfalls in risk management.

fracking the human being

2018.09.18

Don't treat people like they're expendable, treat them like you want to be treated–with respect and dignity.

obtaining SOC-2 reports at a technology vendor

2018.08.23

A technology provider can get nowhere in a regulated industry despite having a great product if the clients lack trust. This is where a SOC-2 audit report can help.

tracking vulnerability fixes to production

2018.08.22

Application vulnerability fixes should be a no-brainer, right?

third party risk

2017.04.22

This guide on third party risk was written towards controlling a range of risks can possibly arise from the outsourcing of core functions

cybersecurity and out-running hikers

2015.05.29

Information risk management today is popularized as a contest of wits and nerve fought in an abstract technological sphere. Behind all of that is an economic reality: this fight must be waged

on strategic risk management

2015.02.02

Strategic risk management is a hard subject to grasp. These matters are so big it's a problem even understanding where to start.

risk, opportunity, and the service organization

2013.07.01

How specialist technology services organizations are required to operate with the risk management capabilities of the regulated industries they serve. This is the first in a chain of articles

 

©2019-2020 m. werneburg.  michael@werneburg.ca