Click on the slide!

EMV and Mobile Payment in 2015

Live Webcast!             Join our expert roundtable as we give some top security guidelines for EMV

Click on the slide!

Don't Be Another Headline

On-Demand               Learn how to implement data security best practices and view now!

Click on the slide!

Are You Securing Hadoop?

On-Demand               Learn about Securing Hadoop by adopting a Data-Centric Approach.

Click on the slide!

Building a Secure, Compliant Cloud.

On-Demand               Play and now learn the key concepts and best practices to build your…

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
French Caldwell
A member of the Gartner Blog Network

  • Facebook’s Experimental Research and “Respect for Persons”
    I’m in the middle of a doctorate program at Northeastern University, and my research focus is on the impact of disruptive technologies on the public policy making process.  Before I ever engaged in any behavioral research, Northeastern required that I achieve certification on protecting human research participants.  The certification was based in large part on […]

  • Court to Google: “Fogettaboutit” – Courts Will Make Technology Policy
    Today, the European Court of Justice ruled that Google, and by implication other search engines, must allow for individuals to have certain personal data blocked from search results.  The case involved a Spanish national who wished to have personal data involving a foreclosure 16 years ago, an issue that has long since been resolved, removed […]

  • How to Get a Risk Aware Culture and Do It Today
    A giant planet killing asteroid helps.  Short of that, perhaps losing millions of your customers over a data breach incident.  Actually, neither of those will create a truly risk aware culture.  When the risk probability is 100%, your people will tend to focus on that one risk and ignore those with lower probabilities.  So the […]

  • The Best Guarantors of Brand and Reputation Are Good People
    Last week my colleagues Andrew Walls, Stessa Cohen and I published the “Regulated Social Media Survival Guide.”  While not all enterprises have strict regulations that limit how they can use social media, all do have in common the need to manage risk to brand and reputation.  I’ve been at the MetricStream GRC Summit today and […]

  • Proposed NSA Reform on Bulk Data Collection Declared Illegal by EU Court of Justice
    Not that it directly affects U.S. legal and constitutional considerations on the NSA phone records program, it is  still worth noting that last week the European Court of Justice declared the EU Data Retention Directive was a violation of the fundamental rights of EU citizens under the Charter of Fundamental Rights of the European Union […]

  • Gartner Dubai Symposium: An Interactive Conversation on Security and Risk Management
    A couple of months ago, the conference chair for Gartner’s Dubai Symposium, Mary Mesaglio, presented me a challenge.  She said, “French, we need more local content and more security content.  What’s possible?” Having made some trips to the Gulf region in the last year, I’d met some really interesting people and heard some great stories.  […]

  • The Myth of EMV
    Like most of us, since the Target hack, I’ve heard statements on how EMV is THE answer to credit card fraud, and how it’s been working great in Europe which has had it for 20 years.  If the business case were so compelling, wouldn’t EMV have made the trip across the Atlantic a long time […]

  • Hey, Corporate Director, Who’s Your CISO?
    I’ve spoken to a few corporate boards on IT governance and risk management, and I’ve one question that I always ask — but first let me clarify this Target CISO tweet with my twitter handle on it. In an internal Gartner e-mail thread about the Target CIO resigning, I added some irony, writing:  “Another good […]

  • Gartner Legal IT Scenario, 2020 – Smart Machines and LPO Radically Disrupt Legal Profession
    The first ever Gartner legal IT scenario is out, and it’s both controversial and not.  Many of the disruptions that we discuss in the scenario are well underway, such as the increasing demand for legal process outsourcing (LPO) and the use of advanced analytics  — so what’s new?  Well,  new are the dramatically disruptive effects […]

  • #RSAC Buzz — Regulators Raising the Bar on Vendor Risk Management
      I went to the RSA conference once  — it was really busy and hearing from my buddies at the front, it’s now busier than ever.  So much for the boycott, eh? A lot of my security buddies are at RSA this week, and are broadcasting the buzz back to the rest of us here […]