IT Agents  >   IT Workforce  >   Executive Management  >  

CISOs

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Chief Information Security Officers, CISO, Information Security Officers
DEFINITION: Those responsible for creating, initiating, driving, and coordinating information security management programs within an organization.
CISOs White Papers (View All Report Types)
23 Matches
Security Essentials for CIO's: Responding to Inevitable Incident
sponsored by IBM
WHITE PAPER: This white paper lists a seven-step process you can take to ensure that your enterprise knows exactly what to do when a security incident occurs.
Posted: 28 Aug 2015 | Published: 31 Aug 2012

IBM

Security Essentials for CIO's: Establishing a Department of Yes
sponsored by IBM
WHITE PAPER: This white paper presents a five-step process for enterprise security that allows you to encourage business innovation without putting your business at risk.
Posted: 26 Aug 2015 | Published: 31 Mar 2012

IBM

Business Drivers for Next Generation Authentication
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper discusses how today's complex authentication environment impacts users and IT professionals alike, and how you can lessen these impacts without lessening security.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

SafeNet, Inc.

The Identity Imperative in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: Read this white paper to discover the importance of identity management in the cloud and to learn how you can maintain security despite the rapidly disappearing network perimeter.
Posted: 16 Jul 2015 | Published: 31 Mar 2015

Symantec Corporation

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover survey results that reveal how IT pros feel about leadership and executive involvement in breach mitigation.
Posted: 24 Mar 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

Securing the Enterprise in 2015: 5 pragmatic steps to security
sponsored by Dell SecureWorks
WHITE PAPER: This white paper outlines a 5-step plan for developing strong security no matter what security product is used.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Dell SecureWorks

What CISOs Need to Know About Cloud Computing
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to identify the key differences between cloud computing and traditional infrastructure for security professionals. Find out where to focus security efforts and how the cloud provides opportunities for security improvement.
Posted: 03 Sep 2014 | Published: 06 Jan 2014

CloudPassage

Are You Ready for the Future of IT?
sponsored by Cisco Systems, Inc.
WHITE PAPER: The Internet of Everything is here: More people, processes, data and things are connecting. Learn why you should embrace this new model.
Posted: 21 Aug 2014 | Published: 14 Mar 2014

Cisco Systems, Inc.

8 Best Practices for Securing Enterprise Data Sources and Achieving Compliance
sponsored by IBM
WHITE PAPER: This informative white paper explains why organizations need to adopt a more proactive, systematic approach to securing sensitive data and addressing compliance requirements amid the digital information explosion.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

How to Overcome Security Skills Deficiencies
sponsored by IBM
WHITE PAPER: This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

The Evolution of Information Security Management: 4-Phased Maturity Model
sponsored by RSA
WHITE PAPER: Over the last few years, protecting IT assets has evolved from technology safeguards, to a full-time management discipline. Based upon this evolutionary trend, ESP developed a 4-phased security maturity model; in this paper explore each phase in-depth, including the key objectives, actions and drivers for the next phase.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

RSA

The CISOs Guide to Measuring IT Security
sponsored by Lumension
WHITE PAPER: In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Lumension

Data Protection 2.0: It’s Not Just Names and Numbers Anymore
sponsored by Tripwire, Inc.
WHITE PAPER: The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protec­tion requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security
sponsored by Tripwire, Inc.
WHITE PAPER: Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

On Common Ground: Where Compliance and Data Protection Overlap
sponsored by Tripwire, Inc.
WHITE PAPER: In this white paper, we first explore the landscape in which CISOs now work—the new standards and regulations they face, increased attacks from hackers, and a more complex IT environment that includes virtualized infrastructure and outsourcing.
Posted: 03 Aug 2010 | Published: 03 Aug 2010

Tripwire, Inc.

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy
sponsored by Tripwire, Inc.
WHITE PAPER: This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more.
Posted: 13 May 2010 | Published: 13 May 2010

Tripwire, Inc.

Leveraging a Maturity Model to Achieve “Proactive Compliance”
sponsored by Symantec Corporation
WHITE PAPER: Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.
Posted: 02 Sep 2009 | Published: 03 Aug 2009

Symantec Corporation

Change is the Enemy of Security and Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: Read this white paper to learn 10 ways that enterprise environments typically change and what you can do to identify, analyze and manage these changes and their associated risks on an ongoing basis.
Posted: 16 Mar 2009 | Published: 02 Mar 2009

nCircle
23 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement