ComputerWeekly.com Research Library

Powered by Bitpipe.com

CISOs Research

  • Why IT Leaders Should Consider the Software Defined Perimeter

    Sponsored by: Zscaler

    See why enterprises are moving away from the traditional DMZ network security method and are using services born in the cloud, to secure the cloud. Propelling their careers, and their organization forward in the process.

  • The Transparent Managed Security Handbook

    Sponsored by: Expel

    Find out how CISOs and cybersecurity teams can spend more time making critical decisions and managing risk than chasing down countless security alerts.

  • Reporting to the Board - A Toolkit for CISOs

    Sponsored by: Dell SecureWorks

    Boards oversee risk, not operations. Rather than tell them how your cybersecurity program works, show them how and how well risks are being managed. Download this CISO toolkit for tips and techniques to approach your board of directors about cybersecurity.

  • InSecurity Podcast: Mark Weatherford on 10 Ways to Earn Quality Time With a CISO

    Sponsored by: Cylance

    In this podcast, Mark Weatherford, SVP and Chief Cybersecurity Strategist at vArmour, shares the 10 ways to earn quality time with a CISO. Listen in and you'll be surprised how successful you can be simply sticking to these rules.

  • Latest Cyber Security Strategies in ASEAN

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.

  • Help for CISOs Overwhelmed by Cybersecurity Threats

    Sponsored by: MASERGY

    Find out how to build your security strategy on a foundation of executive and senior IT-level collaboration, supported by managed detection and response services.

  • How C-Suite Leaders Win By Understanding the Role of the CISO

    Sponsored by: Dell SecureWorks

    This white paper details the role of the CISO, taking an in-depth look at how CISOs can strike the right balance between organizational strategy and risk management.

  • The Top Cyber Security Trends in ANZ in 2017

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.

  • IT Security Salary Index (UK)

    Sponsored by: ComputerWeekly.com

    Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.

  • 2013 Cost of Data Breach Study: UK

    Sponsored by: ComputerWeekly.com

    The cost of data breaches has risen for UK organisations iover the past year, but companies that appoint chief information secruity officers with enterprise-wide responsiblities can reduce their costs, this report from the Ponemon Institute reveals.

  • SIM Technical Guide

    Sponsored by: SearchSecurity.com

    In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.

  • CW Buyer's Guide: Data Security

    Sponsored by: ComputerWeekly.com

    This in-depth buyer's guide offers advice to CISOs on keeping up with security best practice as new EU data protection rules come into force

  • 2012 Security Outlook

    Sponsored by: ComputerWeekly.com

    This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.

  • Dedicated to Information Security: The High-Stakes Role of the CISO

    Sponsored by: SearchSecurity.com

    Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.

  • Securing DevOps

    Sponsored by: SearchSecurity.com

    In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.

  • Why Every CIO Should Consider Vulnerability Assessment a Necessity

    Sponsored by: IBM

    In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.

  • Cloud Security: Enterprise Point of View

    Sponsored by: Dimension Data

    Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.

  • Are You Ready for the Future of IT?

    Sponsored by: Cisco Systems, Inc.

    The Internet of Everything is here: More people, processes, data and things are connecting. Learn why you should embrace this new model.

  • Enterprise Information Security in Transition

    Sponsored by: IBM

    This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.

  • A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment

    Sponsored by: IBM

    This guide discusses security leaders' top concerns with today's aggressive threat landscape.

  • How to Overcome Security Skills Deficiencies

    Sponsored by: IBM

    This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more!

  • Information Security Magazine - April 2013

    Sponsored by: SearchSecurity.com

    This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.

  • The Evolution of Information Security Management: 4-Phased Maturity Model

    Sponsored by: RSA

    Over the last few years, protecting IT assets has evolved from technology safeguards, to a full-time management discipline. Based upon this evolutionary trend, ESP developed a 4-phased security maturity model; in this paper explore each phase in-depth, including the key objectives, actions and drivers for the next phase.

  • The CISOs Guide to Measuring IT Security

    Sponsored by: Lumension

    In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.

  • Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance

    Sponsored by: Silver Tail Systems

    This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.

Browse by Report Type: CISOs White Papers | CISOs Multimedia | CISOs IT Downloads

See more topics related to: CISOs

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.