IT Agents  >   IT Workforce  >   Executive Management  >  

CISO

RSS Feed   
CISO Reports
 
Federated Responsibility for AppSec: A New Model to Power Secure DevOps
sponsored by ZeroNorth
WHITE PAPER: The role of the Chief Information Security Officer (CISO) has long been plagued by the notorious divide between DevOps and Security teams. Luckily, there’s a new solution that can liberate CISOs from this conflict. In this paper, explore the top 4 ways the Federated Responsibility Model can help evolve CISO’s role.
Posted: 07 Jan 2021 | Published: 07 Jan 2021

ZeroNorth

Security as a Team Sport: A Spotlight on the Growing Role of IT in Security Tasks
sponsored by VMware International Unlimited Company
WHITE PAPER: IT and security teams have a hard time seeing eye to eye. They are often siloed as a result, and this can be a major risk to network integrity. VMware commissioned Forrester Consulting to learn how consolidating IT and security could help improve security outcomes. Read their report to see the results and learn 3 key findings.
Posted: 27 Aug 2020 | Published: 31 May 2020

VMware International Unlimited Company

How to Eliminate Your Company's Cloud Security Exposure Risks
sponsored by Atakama
RESOURCE: When it comes to the cloud, there are specific risks that CISOs need to be aware of and prepare for prior to their migration. Read this article to learn more about the top threats to cloud computing and discover best practices for combating them.
Posted: 11 Dec 2020 | Published: 27 Jul 2020

Atakama

Women Building Careers in Cybersecurity
sponsored by WhiteHat Security
WEBCAST: According to a recent study, women make up nearly half of the adult workforce in the US yet hold only a quarter of technology positions – a number that dwindles as you move up the leadership ladder. Watch this webinar and join a panel of women leaders in the tech industry as they discuss their experiences, challenges and accomplishments.
Posted: 15 Dec 2020 | Premiered: Oct 15, 2020

WhiteHat Security

Latest Cyber Security Strategies in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

Ciso’s Survival Guide 5 Tips To Make Your Operations More Efficient
sponsored by Cisco
DATA SHEET: Juggling security and business risks is a challenge when you’re facing talent shortage, evolving threats, and a sprawling vendor landscape. This datasheet was written to help CISOs go from overwhelmed to empowered in 5 easy steps – read on to get started.
Posted: 01 Feb 2021 | Published: 01 Feb 2021

Cisco

5 Key Ways CISOs Can Accelerate the Business
sponsored by Splunk
WHITE PAPER: According to a Forrester study, the role of the chief information security officer (CISO) has changed. Today's CISOs are expected to weigh in on board-level security decisions and map out security programs that meet business objectives. Read on to discover 5 key practices CISOs can implement to help them on their security journey.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Splunk

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by SearchSecurity.com
EZINE: Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences