ComputerWeekly.com Research Library

Powered by Bitpipe.com

CISOs Research

  • The CISO's guide to supply chain security

    Sponsored by: ComputerWeekly.com

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

  • Computer Weekly – 25 August 2020: When algorithms don't play fair

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.

  • SIM Technical Guide

    Sponsored by: SearchSecurity.com

    In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.

  • Dedicated to Information Security: The High-Stakes Role of the CISO

    Sponsored by: SearchSecurity.com

    Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.

  • Securing DevOps

    Sponsored by: SearchSecurity.com

    In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.

  • Why Every CIO Should Consider Vulnerability Assessment a Necessity

    Sponsored by: IBM

    In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.

  • Cloud Security: Enterprise Point of View

    Sponsored by: Dimension Data

    Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.

  • Are You Ready for the Future of IT?

    Sponsored by: Cisco Systems, Inc.

    The Internet of Everything is here: More people, processes, data and things are connecting. Learn why you should embrace this new model.

  • Enterprise Information Security in Transition

    Sponsored by: IBM

    This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.

  • A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment

    Sponsored by: IBM

    This guide discusses security leaders' top concerns with today's aggressive threat landscape.

  • How to Overcome Security Skills Deficiencies

    Sponsored by: IBM

    This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more!

  • Information Security Magazine - April 2013

    Sponsored by: SearchSecurity.com

    This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.

  • The CISOs Guide to Measuring IT Security

    Sponsored by: Lumension

    In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.

  • Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance

    Sponsored by: Silver Tail Systems

    This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.

  • Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security

    Sponsored by: Tripwire, Inc.

    Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.

  • Data Protection 2.0: It’s Not Just Names and Numbers Anymore

    Sponsored by: Tripwire, Inc.

    The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protec­tion requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges.

  • How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)

    Sponsored by: BeyondTrust Corporation

    This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.

  • Leveraging a Maturity Model to Achieve “Proactive Compliance”

    Sponsored by: Symantec Corporation

    Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.

  • Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee

    Sponsored by: Information Security Magazine

    This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.

Browse by Report Type: CISOs White Papers | CISOs Multimedia | CISOs IT Downloads

See more topics related to: CISOs

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.