IT Agents  >   IT Workforce  >   Executive Management  >  

CISOs

RSS Feed   
ALSO CALLED: Chief Information Security Officers, CISO, Information Security Officers
DEFINITION: Those responsible for creating, initiating, driving, and coordinating information security management programs within an organization.
CISOs Reports
1 - 25 of 33 Matches Previous Page  |  Next Page
Implementing the NIST Cybersecurity Framework in Government
sponsored by Absolute Software Corporation
WHITE PAPER: Download this white paper to discover the 5 functions of the NIST cybersecurity framework and why CIOs and CISOs in the public sector should follow this framework in order to best optimize their security approach without exhausting their decreasing budgets.
Posted: 05 Feb 2020 | Published: 07 Dec 2018

Absolute Software Corporation

A CISO’s Guide to Hybrid Cloud Security
sponsored by vArmour
WHITE PAPER: Today’s organizations are adopting cloud at an unprecedented rate to bolster their business operations. As a result, CISOs & their security teams struggle to keep pace with providing data protection and compliance. Download this guide to discover how to achieve continuous security and compliance across hybrid cloud environments.
Posted: 29 Jan 2020 | Published: 29 Jan 2020


CISOs: How to Maintain Your Security (and Sanity) in a Hybrid Cloud World
sponsored by vArmour
WHITE PAPER: Regardless of your organization’s preferred cloud model, ensuring data and application security is critical in order to maintain control, compliance and productivity. Download this white paper to learn how to maintain security in hybrid and multi-cloud environments.
Posted: 28 Jan 2020 | Published: 28 Jan 2020


CISO’s Guide to DevOps: Learning to Cooperate with DevOps
sponsored by ShieldX
WHITE PAPER: Today’s CISOs are under pressure to establish data security protocols while enabling an agile development environment. The following guide is a checklist designed to help CISOs with the issue of incorporating security into DevOps. Read on for tips and tricks on improving how you work with DevOps.
Posted: 27 Jan 2020 | Published: 31 Oct 2018

ShieldX

CISO’s Guide to Multicloud Security
sponsored by ShieldX
WHITE PAPER: As IT security leaders struggle to keep pace with advancing technology and increasing threats within multicloud environments, adopting an agile approach to cloud security may help solve the problem. In the following guide, uncover a checklist that features recommendations for CISOs interested in bolstering their cloud security strategy.
Posted: 27 Jan 2020 | Published: 31 Oct 2018

ShieldX

A CISO’s Guide to Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: Micro-segmentation is growing increasingly popular amongst organizations that operate within multi-cloud environments. It focuses on the workload-level, and only allows permissions based on what the specific task requires. Download this guide for a comprehensive checklist that can help take the pain out of micro-segmentation adoption.
Posted: 23 Jan 2020 | Published: 31 Oct 2018

ShieldX

CISO’s Playbook to Cloud Security
sponsored by Lacework
WHITE PAPER: As organizations continue to implement cloud technologies and capabilities, they introduce additional security concerns that the CISO needs to consider. In this playbook, uncover the steps and strategies IT security leaders should consider in order to achieve these positive outcomes.
Posted: 27 Dec 2019 | Published: 27 Dec 2019

Lacework

CCNA 200-301 Official Cert Guide, Volume 1
sponsored by TechTarget
RESOURCE: Add your valuable networking insights to our market research survey and you'll automatically be entered to win 1 of 4 hardcover copies of: CCNA 200-301 Official Cert Guide, Volume 1. This exclusive giveaway can help you get started on the path to earning and maintaining your Cisco Certified Networking Associate certification.
Posted: 06 Sep 2019 | Published: 02 Nov 2019

TechTarget

Threat Intelligence: Far-fetched Idea or Must-Have Security Tactic?
sponsored by Mimecast
WHITE PAPER: Whether you're a large enterprise or a lean one, threat intelligence is the responsibility of every CISO. Download this white paper to learn how you can make threat intelligence a priority in your cyber resilience planning today.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Mimecast

The Transparent Managed Security Handbook
sponsored by Expel
EBOOK: Find out how CISOs and cybersecurity teams can spend more time making critical decisions and managing risk than chasing down countless security alerts.
Posted: 28 Mar 2019 | Published: 28 Mar 2019

Expel

Latest Cyber Security Strategies in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

IT Security Salary Index (UK)
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

ComputerWeekly.com

2013 Cost of Data Breach Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The cost of data breaches has risen for UK organisations iover the past year, but companies that appoint chief information secruity officers with enterprise-wide responsiblities can reduce their costs, this report from the Ponemon Institute reveals.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

ComputerWeekly.com

SIM Technical Guide
sponsored by SearchSecurity.com
EZINE: In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

SearchSecurity.com

CW Buyer's Guide: Data Security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth buyer's guide offers advice to CISOs on keeping up with security best practice as new EU data protection rules come into force
Posted: 14 Sep 2012 | Published: 05 Apr 2012

ComputerWeekly.com

Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by SearchSecurity.com
EZINE: Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

SearchSecurity.com

Securing DevOps
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

SearchSecurity.com

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Are You Ready for the Future of IT?
sponsored by Cisco Systems, Inc.
WHITE PAPER: The Internet of Everything is here: More people, processes, data and things are connecting. Learn why you should embrace this new model.
Posted: 21 Aug 2014 | Published: 14 Mar 2014

Cisco Systems, Inc.

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

How to Overcome Security Skills Deficiencies
sponsored by IBM
WHITE PAPER: This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

Information Security Magazine - April 2013
sponsored by SearchSecurity.com
EZINE: This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Posted: 03 Apr 2013 | Published: 03 Apr 2013

SearchSecurity.com
1 - 25 of 33 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info