A Review of the Microsoft Edge Web Summit 2017: New Features and Significant Updates

A Review of the Microsoft Edge Web Summit 2017: New Features and Significant Updates

This year’s Microsoft Web Summit was held in Seattle’s Belltown neighborhood and was chock-full of 30-minute sessions exploring Microsoft and partner web technologies. This conference was aimed at web developers and highlighted new technologies, projects, and updates out of Microsoft and other partnered web companies. Here are some of the most exciting projects and ideas that came out of this...

Read More
Security challenges for the NOC – from bookcases to business operations

Security challenges for the NOC – from bookcases to business operations

Building pretty much anything from scratch typically presents challenges. Those simple looking Ikea bookshelves that are advertised as to be a simple build are always more involved than initially expected. If you work in a NOC, you can apply that logic to expanding a technical service offering. You can quickly start to appreciate the complexity associated with augmenting existing...

Read More
The PCI DSS Cares about Disaster Recovery & Backups

The PCI DSS Cares about Disaster Recovery & Backups

In a separate post, we discussed Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS). Building off those thoughts, this post will discuss an often-overlooked consideration when navigating the PCI DSS – disaster recovery (DR) and backups. West Monroe Partners has extensive experience conducting security due diligences for M&A transactions and helping...

Read More
Five things healthcare companies should look for in a managed services provider

Five things healthcare companies should look for in a managed services provider

As technology continues to transform the healthcare industry, firms that deliver health services, along with healthcare providers, are looking to invest their technology dollars in areas that can have the greatest positive impact on their customers.  When budget time rolls around, decisions need to be made about investing in new innovations versus keeping the lights on.…

Read More
Isolating the Cardholder Data Environment with Network Segmentation

Isolating the Cardholder Data Environment with Network Segmentation

In a recent post, we discussed many of the challenges with attesting to PCI DSS compliance, including a description of some of the factors that are often overlooked when defining the cardholder data environment (CDE). See “Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)” from our recent series of blogs on PCI DSS-related topics for more information. …

Read More
How to Talk to the Cloud

How to Talk to the Cloud

Picking up from last week’s post on Preparing to Migrating to a Secure Cloud, the first part of our Azure Secure Cloud Migration blog series, we’ll jump right in to how and why the client’s Azure network was architected. Connectivity and traffic flow between Azure, on-premises locations, and even business partners are things to consider immediately, as they impact the overall structure of the...

Read More
Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)

Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)

In a recent post, we discussed what PCI DSS is, why it matters, and the release of the latest version, including a summary of the changes and the impact of each. See “What PCI DSS version 3.2 means for you” for more information. In 2016, West Monroe Partners has conducted over 140 IT diligences on behalf of private equity firms and strategic buyers across a number of industries as...

Read More
The Importance of a CISO

The Importance of a CISO

Security is one of the fastest-evolving and most complex areas of information technology and a critical concern for companies in just about every industry. Threats to the security of data are increasing and organizations continue to struggle with the changing security landscape and regulations. Sadly, security incidents and data breaches are becoming common place in business today.…

Read More
Partly Cloudy with a Chance of Compliance

Partly Cloudy with a Chance of Compliance

As advisors to our 100+ private equity clients who use M&A activity to provide positive returns to their investors, WMP helps establish platforms, processes, and technology that can enable rapid EBITDA growth. Within the world of M&A, carve-outs and divestitures are some of the most complex situations when it comes to quickly getting the newly acquired business on the right track...

Read More

Assessing Smart Grid Cybersecurity Risk Management with NISTIR 7628

Energy and Utility organizations, driven by regulatory requirements and the desire to demonstrate a strong security posture, can turn to NIST Cybersecurity Framework and NISTIR 7628 for guidance. The National Institute of Standards and Technology Interagency Report 7628 (NISTIR 7628), Guidelines for Smart Grid Cybersecurity, is a three-volume report that presents a cybersecurity framework that...

Read More

What You Need to Know about Identity Access Management

Identity and access management – the process of ensuring the right people have the right access to information – should be a key component of any organization’s security infrastructure. A sound IAM approach will not only help protect your sensitive data, it will also save you time and money. However, implementation challenges such as business system complexities, lack of defined user roles and...

Read More

Identity and Access Management – The Cart or The Horse?

In my experiences with identity and access management (IAM) projects, there is always a moment when you begin having a “Are we putting the cart before the horse?” conversation.  This is particularly the case when you are, in parallel, having a conversation about how to “enable” IAM in the environment by either redesigning your current implementation of Windows Server Active Directory, creating...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons