IT Agents  >   IT Workforce  >   Executive Management  >  

CISOs

RSS Feed   
ALSO CALLED: Chief Information Security Officers, CISO, Information Security Officers
DEFINITION: Those responsible for creating, initiating, driving, and coordinating information security management programs within an organization.
CISOs Reports
1 - 25 of 51 Matches Previous Page  |  Next Page
Delivering the Secure Workspace of the Future
sponsored by Citrix
RESOURCE: In this state of the security enterprise report, Stan Black, SVP and CISO at Citrix discusses how they approach and govern security. Discover key insights into the security focus areas and controls they use across services.
Posted: 23 Oct 2018 | Published: 23 Oct 2018

Citrix

The Need for an Integrated Security Strategy
sponsored by Fortinet, Inc.
ANALYST REPORT: CISOs are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. An integrated security strategy can help. Download this report for some Q&A on the advantages of implementing an integrated security strategy in your organization.
Posted: 11 Oct 2018 | Published: 30 Jun 2018

Fortinet, Inc.

A CISO Guide to Multi-Cloud Security
sponsored by Fortinet, Inc.
WHITE PAPER: Discover the guide to a security fabric approach to multi-cloud security.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Fortinet, Inc.

Top 5 Least Privilege Reports CISOs Live For Implement Least Privilege for a Measurable Security Plan
sponsored by Thycotic
RESOURCE: Among all security strategies CISOs employ, the principle of least privilege is one that can draw a direct line from implementation to value. Download this resource to learn what it takes to implement least privilege in your organization, today.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Thycotic

Closing the Communication Gap Around Security & Digital Transformation
sponsored by Rackspace
EBOOK: Despite cybersecurity being front of mind for board members, many admit they do not have a strategy to tackle the 'how, what, where and why' questions related to data protection. Read on for an in-depth explanation of why the board and ITDMs need to close the communication gap around security and digital transformation, today.
Posted: 04 Oct 2018 | Published: 04 Oct 2018

Rackspace

How to make a swift and automatic cybersecurity incident response plan
sponsored by TechTarget
RESOURCE: Effective incident response policies must be detailed, comprehensive and regularly updated -- and then 'embedded in the hearts and minds' of infosec team members. This e-guide to creating an effective incident response plan includes expert guidance on the nitty gritty details your plan should have.
Posted: 02 Oct 2018 | Published: 02 Oct 2018

TechTarget

An ESG Research Insights Report: Security Operations Challenges, Priorities, and Strategies
sponsored by Siemplify
RESEARCH CONTENT: This report on security operations issues offers suggestions to address these problems from cybersecurity professionals themselves.
Posted: 26 Sep 2018 | Published: 31 Mar 2017

Siemplify

Reporting to the Board - A Toolkit for CISOs
sponsored by Dell SecureWorks
RESOURCE: Boards oversee risk, not operations. Rather than tell them how your cybersecurity program works, show them how and how well risks are being managed. Download this CISO toolkit for tips and techniques to approach your board of directors about cybersecurity.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Dell SecureWorks

InSecurity Podcast: Mark Weatherford on 10 Ways to Earn Quality Time With a CISO
sponsored by Cylance
PODCAST: In this podcast, Mark Weatherford, SVP and Chief Cybersecurity Strategist at vArmour, shares the 10 ways to earn quality time with a CISO. Listen in and you'll be surprised how successful you can be simply sticking to these rules.
Posted: 24 Aug 2018 | Premiered: Aug 23, 2018

Cylance

2018 Security Implications of Digital Transformation Report
sponsored by Fortinet, Inc.
ANALYST REPORT: While the potential of digital transformation is exciting from a business perspective, changes stemming from it can create chaos for the cybersecurity team and IT organizations in general. Uncover survey findings from 300 CISOs and CSOs, and more.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

Fortinet, Inc.

Latest Cyber Security Strategies in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

2018: Cyberthreat Predictions & Security Strategy
sponsored by Aruba Networks
VIDEO: With major breaches exposing a vast amount of personal information and disruptive ransomware attacks shaking the world, it is critical to examine the lessons learn from these events to shape a strategy. In this webinar, listen to a panel of security experts as they discuss.
Posted: 10 Aug 2018 | Premiered: 02 Aug 2018

Aruba Networks

Reducing Cyber Exposure from Cloud to Containers: 5 Key Learnings from the CISO POV
sponsored by Tenable
RESOURCE: To combat the issue of cyber risk, a discipline called cyber exposure is emerging to help organizations manage and measure their risk. In this e-book, uncover insights from CISOs on how they are addressing the modern attack surface, including 5 key takeaways on their cyber exposure journey.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

Tenable

Help for CISOs Overwhelmed by Cybersecurity Threats
sponsored by MASERGY
WHITE PAPER: Find out how to build your security strategy on a foundation of executive and senior IT-level collaboration, supported by managed detection and response services.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

MASERGY

How C-Suite Leaders Win By Understanding the Role of the CISO
sponsored by Dell SecureWorks
WHITE PAPER: This white paper details the role of the CISO, taking an in-depth look at how CISOs can strike the right balance between organizational strategy and risk management.
Posted: 27 Apr 2018 | Published: 31 Dec 2017

Dell SecureWorks

The Voice of the Enterprise CISO
sponsored by NSS Labs
WHITE PAPER: According to the 2017 Verizon DBIR, approximately 90% of all security incidents and breaches involve some form of phishing attack. This white paper uncovers the biggest challenges for security leaders and offers strategies for combatting such challenges.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

NSS Labs

7 Critical Factors for an Optimized IAM Security Investment
sponsored by Edgile
WHITE PAPER: With security breaches dominating the headlines, CISOs find themselves fighting fires, rather than strategically planning. This resource offers a strategy-first approach allowing CISOs to build better long term investments and stay more secure.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Edgile

Four CISO Tribes and Where to Find Them
sponsored by Synopsys
WHITE PAPER: In this research content, gathered based on interviews with 25 CISOs, discover 4 distinct approaches to the role of CISO. Learn what makes each one distinct, how you can use this information to push your own career forward, and more.
Posted: 18 Jan 2018 | Published: 29 Dec 2017

Synopsys

The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

Resilient Security Architectures: The Paradigm Shift is Here
sponsored by Ixia - Keysight
WHITE PAPER: In the current business climate, it's not a question of if your network will be attacked, but when it will be attacked and how. Learn about a new paradigm shift that's emerging in response to this pressure called security resilience.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Ixia - Keysight

Aruba 360 Secure Fabric: A User-centric Approach to Network Security
sponsored by Aruba Networks
WHITE PAPER: Find out how network business decision-makers, CISOs, and other network security leaders can get involved and meet the challenges of mobile, cloud, and IoT head-on.
Posted: 07 Jun 2018 | Published: 31 Mar 2018

Aruba Networks

What Keeps Me Up At Night?: Concerns of a CISO
sponsored by enSilo
WEBCAST: Watch this webcast to uncover a list of security concerns facing CISOs today as well as pre-infection protection strategies to lessen these concerns.
Posted: 19 Jan 2018 | Premiered: Jan 19, 2018


How to Become a Superstar Security Leader
sponsored by Google Cloud
RESEARCH CONTENT: Be the superstar security leader your fellow executives need. This report looks at the biggest changes in firms' expectations of their CISOs and provides specific examples of how top information security professionals rise to those occasions. Download the Forrester report today and secure your future.
Posted: 08 Aug 2017 | Published: 13 Feb 2017

Google Cloud

Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by SearchSecurity.com
EZINE: Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

SearchSecurity.com

Securing DevOps
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

SearchSecurity.com
1 - 25 of 51 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement