IT Agents  >   IT Workforce  >   Executive Management  >  

Information Security Officers

RSS Feed    Add to Google    Add to My Yahoo!
Information Security OfficersReports
 
2013 Cost of Data Breach Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The cost of data breaches has risen for UK organisations iover the past year, but companies that appoint chief information secruity officers with enterprise-wide responsiblities can reduce their costs, this report from the Ponemon Institute reveals.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

ComputerWeekly.com

2012 Security Outlook
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

ComputerWeekly.com

10 Questions CISOs Should Ask About Mobile Security
sponsored by Bluebox
WEBCAST: This webcast reveals the answers to 10 questions CISOs should ask about mobile security.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Bluebox

CW Buyer's Guide: Data Security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth buyer's guide offers advice to CISOs on keeping up with security best practice as new EU data protection rules come into force
Posted: 14 Sep 2012 | Published: 05 Apr 2012

ComputerWeekly.com

What CISOs Need to Know About Cloud Computing
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to identify the key differences between cloud computing and traditional infrastructure for security professionals. Find out where to focus security efforts and how the cloud provides opportunities for security improvement.
Posted: 03 Sep 2014 | Published: 06 Jan 2014

CloudPassage

IT Security Salary Index (UK)
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

ComputerWeekly.com

How to Overcome Security Skills Deficiencies
sponsored by IBM
WHITE PAPER: This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

On Common Ground: Where Compliance and Data Protection Overlap
sponsored by Tripwire, Inc.
WHITE PAPER: In this white paper, we first explore the landscape in which CISOs now work—the new standards and regulations they face, increased attacks from hackers, and a more complex IT environment that includes virtualized infrastructure and outsourcing.
Posted: 03 Aug 2010 | Published: 03 Aug 2010

Tripwire, Inc.

Change is the Enemy of Security and Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: Read this white paper to learn 10 ways that enterprise environments typically change and what you can do to identify, analyze and manage these changes and their associated risks on an ongoing basis.
Posted: 16 Mar 2009 | Published: 02 Mar 2009

nCircle

Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy
sponsored by Tripwire, Inc.
WHITE PAPER: This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more.
Posted: 13 May 2010 | Published: 13 May 2010

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement