ComputerWeekly.com Research Library

Powered by Bitpipe.com

CISOs Research

  • Global Cyber Security Metrics Report

    Sponsored by: Thycotic

    For CISOs, the increased cybersecurity pressure (both internal and external) is causing significant stress and burnout – the average CISO lasts roughly 18 months in the role. To help security leaders avoid this burden, Thycotic created this report, which offers guidance and best practices to achieve success and reduce stress.

  • Aligning Cyber Risk Management with Business Performance

    Sponsored by: Coalfire

    Traditionally, the realm of cybersecurity was considered a technical issue to be solved by technical people. The mindset has changed, and organizations are looking to align cybersecurity objectives with business imperatives. Download this white paper to explore how CISOs can develop a plan to mitigate risks while optimizing resources.

  • Protecting OT Infrastructures with Real-time, Automated Endpoint Security

    Sponsored by: Fortinet, Inc.

    As the convergence of OT and IT infrastructures gains momentum, cybersecurity professionals look to CISOs as the individual responsible for securing converged infrastructures. This solution brief provides an in-depth look at FortiEDR, designed to aid the CISO by providing endpoint protection for production environments.

  • The COO and Operational Technology Cybersecurity

    Sponsored by: Fortinet, Inc.

    Even though cybersecurity is often synonymous with the CISO, the COO plays a key role when it comes to securing the operational technology (OT) infrastructure. The following report highlights the research findings from a Fortinet study into the challenges COOs face when it comes to OT security. Read on to unlock the results.

  • Your Cybersecurity Cheat Sheet for the C-Suite

    Sponsored by: Dell SecureWorks

    How can you convince and activate all members of the C-Suite to better tackle cyber threats? Inside this cheat sheet, you’ll find four steps to convince your C-Suite that cybersecurity deserves their attention. Learn how you can emphasize that cybersecurity is a shared challenge.

  • What Boards Should Know About the Company’s Cybersecurity Strategy

    Sponsored by: Dell SecureWorks

    In order to stay ahead of today’s cyberthreats, security leadership is opting to include board members and non-security leaders in their strategic planning so they can achieve an organization-wide resiliency approach. Download this white paper to discover how to develop a collaborative strategy.

  • Your Guide to Mastering Vulnerability Remediation

    Sponsored by: Vulcan

    In order to preemptively contain threats, today’s organizations must have policies, processes and tools in place in order to adequately detect and assess vulnerabilities. This article highlights 8 best practices your organization can take to overcome the common barriers to implementing effective vulnerability remediation. Read on to get started.

  • Your Vulnerability Management Process Isn't Working

    Sponsored by: Vulcan

    When it comes to vulnerability discover and remediation, it’s easy to get caught up in the details. Every now and then it’s important for CISOs to take a step back and make sure you’re not missing the security forest for the vulnerability trees. This article focuses on three common, but costly, mistakes that IT and security leaders should avoid.

  • Cognitions of a Cybercriminal

    Sponsored by: VMware International Unlimited Company

    Cybercriminals grow increasingly creative each year, finding new ways to bypass security methods without detection. This white paper is designed to help CISOs in their pursuit of cybercriminals by offering an inside look into the mindset of their behavior and breaking down their attack patterns. Access now to reserve your copy.

  • VMware Carbon Black Cloud Audit and Remediation

    Sponsored by: VMware International Unlimited Company

    In this datasheet, explore the key features and capabilities of VMware Carbon Black Cloud Audit and Remediation, designed to deliver real-time assessment and remediation for faster, easier access to audit and reconfigure endpoints across their organization.

  • Research Highlights: Security Operations Transformation

    Sponsored by: ServiceNow

    Security operations remain inefficient and ineffective, and staffing and skills shortages are a reality that must be addressed. This is based on a recent survey of 372 IT and cybersecurity professionals in North America. This ESG research report is jam-packed with insights about the complex challenges of security operations.

  • 5 Key Ways CISOs Can Accelerate the Business

    Sponsored by: Splunk

    According to a Forrester study, the role of the chief information security officer (CISO) has changed. Today's CISOs are expected to weigh in on board-level security decisions and map out security programs that meet business objectives. Read on to discover 5 key practices CISOs can implement to help them on their security journey.

  • A CISO’s Guide to Hybrid Cloud Security

    Sponsored by: vArmour

    Today’s organizations are adopting cloud at an unprecedented rate to bolster their business operations. As a result, CISOs & their security teams struggle to keep pace with providing data protection and compliance. Download this guide to discover how to achieve continuous security and compliance across hybrid cloud environments.

  • CISOs: How to Maintain Your Security (and Sanity) in a Hybrid Cloud World

    Sponsored by: vArmour

    Regardless of your organization’s preferred cloud model, ensuring data and application security is critical in order to maintain control, compliance and productivity. Download this white paper to learn how to maintain security in hybrid and multi-cloud environments.

  • Threat Intelligence: Far-fetched Idea or Must-Have Security Tactic?

    Sponsored by: Mimecast 2020

    Whether you're a large enterprise or a lean one, threat intelligence is the responsibility of every CISO. Download this white paper to learn how you can make threat intelligence a priority in your cyber resilience planning today.

  • Latest Cyber Security Strategies in ASEAN

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.

  • The Top Cyber Security Trends in ANZ in 2017

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.

  • IT Security Salary Index (UK)

    Sponsored by: ComputerWeekly.com

    Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.

  • Dedicated to Information Security: The High-Stakes Role of the CISO

    Sponsored by: SearchSecurity.com

    Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.

  • Securing DevOps

    Sponsored by: SearchSecurity.com

    In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.

  • Why Every CIO Should Consider Vulnerability Assessment a Necessity

    Sponsored by: IBM

    In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.

  • Cloud Security: Enterprise Point of View

    Sponsored by: Dimension Data

    Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.

  • Are You Ready for the Future of IT?

    Sponsored by: Cisco Systems, Inc.

    The Internet of Everything is here: More people, processes, data and things are connecting. Learn why you should embrace this new model.

  • Enterprise Information Security in Transition

    Sponsored by: IBM

    This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.

  • A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment

    Sponsored by: IBM

    This guide discusses security leaders' top concerns with today's aggressive threat landscape.

Browse by Report Type: CISOs White Papers | CISOs Multimedia | CISOs IT Downloads

See more topics related to: CISOs

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.