IT Agents  >   IT Workforce  >   Executive Management  >  

CISOs

RSS Feed   
ALSO CALLED: Chief Information Security Officers, CISO, Information Security Officers
DEFINITION: Those responsible for creating, initiating, driving, and coordinating information security management programs within an organization.
CISOs Reports
1 - 25 of 42 Matches Previous Page  |  Next Page
Stopping BEC and EAC: Email Security in 2020
sponsored by Proofpoint
EBOOK: Email continues to be the leading vector in successful cyberattacks, leaving CISOs with the increasingly difficult responsibilities of protecting employee inboxes and stopping potential threats. Read this eBook for a comprehensive guide to stopping Business email compromise (BEC) and email account compromise (EAC) attacks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Proofpoint

IT & Security Perspectives: A Spotlight On C-level Vs. VP/Below
sponsored by VMware International Unlimited Company
ANALYST REPORT: IT and security teams are tasked with handling major risks and concerns daily. However, in some cases, the gaps between C-level perceptions and practitioners’ reality cause teams to work at odds with each other. View this Forrester report, commissioned by VMware, to get specific on how seniority affects perspective.
Posted: 18 Nov 2020 | Published: 29 May 2020

VMware International Unlimited Company

2020 Payment Security Report
sponsored by Verizon
RESEARCH CONTENT: Each year, Verizon releases a Payment Security Report, which aggregates findings across a number of security and compliance subject areas into valuable insights designed to help CISOs understand and overcome key security pitfalls, operational challenges and compliance roadblocks – read on for this year’s report.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Verizon

A Transformative Approach to Addressing Today’s Cybersecurity Threat Landscape
sponsored by Lumen
VIDEO: Given the severity of today’s cyberthreats and the penalties for regulatory noncompliance, business outcomes are heavily influenced (if not fully dictated) by an organization’s cybersecurity well-being. Watch this webinar to learn how to align cybersecurity with business objectives and address today’s threats.
Posted: 27 Oct 2020 | Premiered: 27 Oct 2020

Lumen

The Future-Ready SOC: Using XDR to Achieve Unified Visibility and Control
sponsored by VMware International Unlimited Company
WHITE PAPER: The technological and procedural silos that exist between IT and security operations center (SOC) team members have impeded an enterprise’s ability to effectively mitigate risk. Turn the tide – read this white paper to examine how extended detection & response (XDR) can help.
Posted: 27 Oct 2020 | Published: 30 Sep 2020

VMware International Unlimited Company

AppSec for the Newly Hired CISO/CSO
sponsored by Contrast Security
EBOOK: For new CISOs and CSOs, the tasks and demands of the new role can be overwhelming – especially as digital transformation changes conventional approaches to application security. Read this e-book for AppSec guidance and best practices for new CISO/CIOs.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Contrast Security

How is the Role and World of the CISO Changing?
sponsored by Kaspersky Lab
RESOURCE: As cybersecurity risks increase, the role of the CISO becomes more dynamic. 70% of current CISOs report that risk management is now a key part of their role. For more CISO trends, take a look at this survey conducted by 451 Research. Use it to understand what the role of today’s CISOs looks like as well as the top 5 skills to succeed in the role.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Kaspersky Lab

Hacker vs CISO: Exploiting and Protecting Your WFH Workforce
sponsored by Tanium
WEBCAST: The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.
Posted: 01 Sep 2020 | Premiered: Aug 28, 2020

Tanium

Security as a Team Sport: A Spotlight on the Growing Role of IT in Security Tasks
sponsored by VMware International Unlimited Company
WHITE PAPER: IT and security teams have a hard time seeing eye to eye. They are often siloed as a result, and this can be a major risk to network integrity. VMware commissioned Forrester Consulting to learn how consolidating IT and security could help improve security outcomes. Read their report to see the results and learn 3 key findings.
Posted: 27 Aug 2020 | Published: 31 May 2020

VMware International Unlimited Company

Computer Weekly – 25 August 2020: When algorithms don't play fair
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.
Posted: 24 Aug 2020 | Published: 25 Aug 2020

ComputerWeekly.com

CISO’s Guide to Reducing Risk with Responsible Disclosure
sponsored by HackerOne
WHITE PAPER: Data breaches have devastated organizations over recent years. However, countless breaches were prevented due to hackers disclosing known security vulnerabilities to the organization through what’s known as vulnerability disclosure polices (VDPs). In this white paper, discover how CISO’s can leverage VDPs to reduce risk in their environments.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

HackerOne

Protecting OT Infrastructures with Real-time, Automated Endpoint Security
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW: As the convergence of OT and IT infrastructures gains momentum, cybersecurity professionals look to CISOs as the individual responsible for securing converged infrastructures. This solution brief provides an in-depth look at FortiEDR, designed to aid the CISO by providing endpoint protection for production environments.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

Fortinet, Inc.

The COO and Operational Technology Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Even though cybersecurity is often synonymous with the CISO, the COO plays a key role when it comes to securing the operational technology (OT) infrastructure. The following report highlights the research findings from a Fortinet study into the challenges COOs face when it comes to OT security. Read on to unlock the results.
Posted: 15 Jun 2020 | Published: 15 Jun 2020

Fortinet, Inc.

Cognitions of a Cybercriminal
sponsored by VMware International Unlimited Company
WHITE PAPER: Cybercriminals grow increasingly creative each year, finding new ways to bypass security methods without detection. This white paper is designed to help CISOs in their pursuit of cybercriminals by offering an inside look into the mindset of their behavior and breaking down their attack patterns. Access now to reserve your copy.
Posted: 15 May 2020 | Published: 31 Jul 2019

VMware International Unlimited Company

VMware Carbon Black Cloud Audit and Remediation
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Cloud Audit and Remediation, designed to deliver real-time assessment and remediation for faster, easier access to audit and reconfigure endpoints across their organization.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

VMware International Unlimited Company

Research Highlights: Security Operations Transformation
sponsored by ServiceNow
ANALYST REPORT: Security operations remain inefficient and ineffective, and staffing and skills shortages are a reality that must be addressed. This is based on a recent survey of 372 IT and cybersecurity professionals in North America. This ESG research report is jam-packed with insights about the complex challenges of security operations.
Posted: 06 Mar 2020 | Published: 31 Dec 2019

ServiceNow

5 Key Ways CISOs Can Accelerate the Business
sponsored by Splunk
WHITE PAPER: According to a Forrester study, the role of the chief information security officer (CISO) has changed. Today's CISOs are expected to weigh in on board-level security decisions and map out security programs that meet business objectives. Read on to discover 5 key practices CISOs can implement to help them on their security journey.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Splunk

How to Avoid Disruption by Bridging the Resilience Gap
sponsored by Tanium
WHITE PAPER: As organizations grow increasingly complex, IT security teams struggle to remain resilient as they face internal and external pressures. A recent study was conducted to better understand the barriers to resilience and the tradeoffs faced by decision-makers. Read on to uncover the key insights and conclusions.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

Tanium

Threat Intelligence: Far-fetched Idea or Must-Have Security Tactic?
sponsored by Mimecast 2020
WHITE PAPER: Whether you're a large enterprise or a lean one, threat intelligence is the responsibility of every CISO. Download this white paper to learn how you can make threat intelligence a priority in your cyber resilience planning today.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Mimecast 2020

Latest Cyber Security Strategies in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by SearchSecurity.com
EZINE: Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

SearchSecurity.com

Securing DevOps
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

SearchSecurity.com

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data
1 - 25 of 42 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info