ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Dell SecureWorks

  • Four Steps to Developing a World-Class Security Program

    A reactive security approach is all too common, even though the question is not if a company will suffer an incident but when. By adopting a proactive stance, organizations minimize the likelihood of suffering a breach. In this white paper, discover 4 steps to developing a world-class security program.

  • 2018 Incident Response Insights Report

    In Secureworks 2018 Security Leaders Survey, 43% of respondents said that regular threat hunting activities were part of their incident response program. Access this 29-page research report to uncover best practices and valuable lessons learned over the past year from real-world incidents.

  • Security Maturity: Mapping the Road to Resilience

    Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.

  • What to Look for in an MDR Provider

    There are plenty of security providers offering Managed Detection and Response (MDR) solutions, but it is important to ensure they offer capabilities that match your business's needs. In this white paper, learn 5 key areas organizations should investigate when evaluating and selecting an MDR provider.

  • 9 Key Questions to Ask When Selecting an Incident Response Service Provider

    Many people associate the term "incident response" with recovery efforts following a major security breach. However, effective incident response is not just reactive, nor is it confined to major incidents. In this white paper, learn how an incident response provider can assist you with a range of prevention, detection, and response activities.

  • Cyber Global Warming Real Life Malscape Insights

    In this webcast, learn how you can measure your cyber-resilience with behavioral intelligence.

  • How to Reach Cybersecurity Maturity in 5 Critical Steps

    Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.

  • How Cybercriminals are Adapting to Outwit Defenses

    From July 2017 through June 2018, SecureWorks Counter Threat Unit researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. In this webcast, gain insight on the key findings from the report.

  • DIY is DOA: Cybersecurity Moves Toward Hybrid Models

    Information security always was complex and challenging. But the rise of cloud and mobile organizations has multiplied that challenge. However, information security services providers (ISSPs) can help organizations by empowering their internal resources. In this white paper, explore how using ISSPs can leverage an organization's operations.

  • 2018 State of Cybercrime

    Find out the deep, dark truth behind the underground hacker economy in the 2018 State of Cybercrime report.

  • Eliminating the Blind Spot

    Today, enterprises must obtain end-to-end visibility, detection and response capabilities required to quickly remediate breaches. In this white paper, learn how unifying advanced detection technologies for the network and endpoint with the right intelligence, people and processes can empower a security team.

  • Threat Intelligence Executive Report

    In the last year, the number of sophisticated attacks has increased and threat actors have demonstrated greater adaptability. However, implementing security best practices could limit the impact of many intrusions. In this research report, learn about key developments in the cybercrime threat landscape.

  • 2018 State of Cybercrime

    Find out the deep, dark truth behind the underground hacker economy.

  • Security Maturity: Mapping the Road to Resilience

    Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.

  • How to Reach Cybersecurity Maturity in 5 Critical Steps

    Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.

  • Secureworks Security Maturity Model

    Learn how you can evaluate your organization's cybersecurity maturity based on its business operations and risk profile.

  • Reporting to the Board - A Toolkit for CISOs

    Boards oversee risk, not operations. Rather than tell them how your cybersecurity program works, show them how and how well risks are being managed. Download this CISO toolkit for tips and techniques to approach your board of directors about cybersecurity.

  • What Boards Should Know About The Company's Cybersecurity Strategy

    Achieving resiliency requires a proactive security strategy. In this resource, find out how a resiliency model should look like from a board or C-suite perspective.

  • How C-Suite Leaders Win By Understanding the Role of the CISO

    This white paper details the role of the CISO, taking an in-depth look at how CISOs can strike the right balance between organizational strategy and risk management.

  • Board Oversight of Cybersecurity Risk: A Framework for Inquiry

    Use this white paper as your tool for improving the board-management dialog on cybersecurity risk management. It will help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.

  • The Path Ahead for Security Leaders

    Learn how to link your identity to business value rather than limiting it to security expertise. By doing so, the security leaders of today can earn a strategic role on the executive teams of tomorrow.

  • GDPR: The Race is on for Compliance

    Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.

  • Overcoming Security Breaches and Minimizing the Impact

    Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.

  • Five Critical Rules for Firewall Management

    This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.

  • Presentation Transcript: Incident Response - Are you prepared?

    In this presentation transcript, Lee Lawson, Head of Response Service for Dell SecureWorks EMEA outlines a successful Incident Response approach and best practices for your organisation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.