IT Agents  >   IT Workforce  >   Executive Management  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Chief Information Security Officers, CISO, Information Security Officers
DEFINITION: Those responsible for creating, initiating, driving, and coordinating information security management programs within an organization.
CISOs White Papers (View All Report Types)
1 - 25 of 27 Matches Previous Page  |  Next Page
Best Practices for Strong Cyber Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how enterprise security best practices can help you avoid suffering financial losses, damage to your brand, and damage to customer relationships caused by undetected or detected too late cyber attacks.
Posted: 20 Nov 2015 | Published: 30 Sep 2015

Hewlett Packard Enterprise

From Checkboxes to Frameworks: CISO Insights on Moving From Compliance to Risk-Based Cyber-Security Programs
sponsored by IBM
WHITE PAPER: Access this report to discover three common struggles experienced by CISOs, as well as a five-step program designed to improve your cyber-security strategy.
Posted: 09 Nov 2015 | Published: 30 Oct 2015


The Cyber Threat Risk: Oversight Guidance for CEOs and Boards
sponsored by LogRhythm, Inc.
WHITE PAPER: This resource discusses what CEOs and other executives can do to ensure strong security in their enterprises.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

LogRhythm, Inc.

Breach Preparation: Plan for the Inevitability of Compromise
sponsored by Bit9 + Carbon Black
WHITE PAPER: This paper features advice from a diverse array of professionals who understand how to clean up after a cyber-breach. From communications to legal concerns to data forensics, these experts share valuable insight into every aspect of incident response.
Posted: 05 Nov 2015 | Published: 31 Dec 2014

Bit9 + Carbon Black

Cisco Continues Its Blistering Security Acquisition Pace With The Addition Of OpenDNS
sponsored by OpenDNS
WHITE PAPER: This report details the impact of this acquisition as well as the broader implications of Cisco's previous acquisitions of Cognitive Security, Sourcefire, ThreatGrid, and neohapsis. View now to learn more about Cisco's security profile and if they can tackle today's network security attacks.
Posted: 15 Oct 2015 | Published: 06 Aug 2015


Security Essentials for CIO's: Responding to Inevitable Incident
sponsored by IBM
WHITE PAPER: This white paper lists a seven-step process that will help you ensure that your security team knows exactly what to do when an incident occurs.
Posted: 28 Aug 2015 | Published: 31 Aug 2012


Security Essentials for CIO's: Establishing a Department of Yes
sponsored by IBM
WHITE PAPER: This white paper presents a five-step process for enterprise security that allows you to encourage business innovation without putting your business at risk.
Posted: 26 Aug 2015 | Published: 31 Mar 2012


The Identity Imperative in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: Read this white paper to discover the importance of identity management in the cloud and to learn how you can maintain security despite the rapidly disappearing network perimeter.
Posted: 16 Jul 2015 | Published: 31 Mar 2015

Symantec Corporation

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this white paper, discover survey results that reveal how IT pros feel about leadership and executive involvement in breach mitigation.
Posted: 24 Mar 2015 | Published: 31 Oct 2014

Hewlett-Packard Enterprise

Securing the Enterprise in 2015: 5 pragmatic steps to security
sponsored by Dell SecureWorks
WHITE PAPER: This white paper outlines a 5-step plan for developing strong security no matter what security product is used.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Dell SecureWorks

What CISOs Need to Know About Cloud Computing
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to identify the key differences between cloud computing and traditional infrastructure for security professionals. Find out where to focus security efforts and how the cloud provides opportunities for security improvement.
Posted: 03 Sep 2014 | Published: 06 Jan 2014


8 Best Practices for Securing Enterprise Data Sources and Achieving Compliance
sponsored by IBM
WHITE PAPER: This informative white paper explains why organizations need to adopt a more proactive, systematic approach to securing sensitive data and addressing compliance requirements amid the digital information explosion.
Posted: 30 Jul 2013 | Published: 30 Jul 2013


Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014


Are You Ready for the Future of IT?
sponsored by Cisco Systems, Inc.
WHITE PAPER: The Internet of Everything is here: More people, processes, data and things are connecting. Learn why you should embrace this new model.
Posted: 21 Aug 2014 | Published: 14 Mar 2014

Cisco Systems, Inc.

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012


A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013


How to Overcome Security Skills Deficiencies
sponsored by IBM
WHITE PAPER: This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013


A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

The Evolution of Information Security Management: 4-Phased Maturity Model
sponsored by RSA
WHITE PAPER: Over the last few years, protecting IT assets has evolved from technology safeguards, to a full-time management discipline. Based upon this evolutionary trend, ESP developed a 4-phased security maturity model; in this paper explore each phase in-depth, including the key objectives, actions and drivers for the next phase.
Posted: 27 Mar 2012 | Published: 27 Mar 2012


The CISOs Guide to Measuring IT Security
sponsored by Lumension
WHITE PAPER: In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Posted: 12 Jan 2012 | Published: 12 Jan 2012


Data Protection 2.0: It’s Not Just Names and Numbers Anymore
sponsored by Tripwire, Inc.
WHITE PAPER: The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protec­tion requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security
sponsored by Tripwire, Inc.
WHITE PAPER: Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

On Common Ground: Where Compliance and Data Protection Overlap
sponsored by Tripwire, Inc.
WHITE PAPER: In this white paper, we first explore the landscape in which CISOs now work—the new standards and regulations they face, increased attacks from hackers, and a more complex IT environment that includes virtualized infrastructure and outsourcing.
Posted: 03 Aug 2010 | Published: 03 Aug 2010

Tripwire, Inc.

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy
sponsored by Tripwire, Inc.
WHITE PAPER: This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more.
Posted: 13 May 2010 | Published: 13 May 2010

Tripwire, Inc.
1 - 25 of 27 Matches Previous Page    1 2    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement