IT Agents  >   IT Workforce  >   Executive Management  >  

CISOs

RSS Feed   
ALSO CALLED: Chief Information Security Officers, CISO, Information Security Officers
DEFINITION: Those responsible for creating, initiating, driving, and coordinating information security management programs within an organization.
CISOs Reports
1 - 25 of 44 Matches Previous Page  |  Next Page
Reporting to the Board - A Toolkit for CISOs
sponsored by Dell SecureWorks
RESOURCE: Boards oversee risk, not operations. Rather than tell them how your cybersecurity program works, show them how and how well risks are being managed. Download this CISO toolkit for tips and techniques to approach your board of directors about cybersecurity.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Dell SecureWorks

InSecurity Podcast: Mark Weatherford on 10 Ways to Earn Quality Time With a CISO
sponsored by Cylance
PODCAST: In this podcast, Mark Weatherford, SVP and Chief Cybersecurity Strategist at vArmour, shares the 10 ways to earn quality time with a CISO. Listen in and you'll be surprised how successful you can be simply sticking to these rules.
Posted: 24 Aug 2018 | Premiered: Aug 23, 2018

Cylance

2018 Security Implications of Digital Transformation Report
sponsored by Fortinet, Inc.
ANALYST REPORT: While the potential of digital transformation is exciting from a business perspective, changes stemming from it can create chaos for the cybersecurity team and IT organizations in general. Uncover survey findings from 300 CISOs and CSOs, and more.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

Fortinet, Inc.

Latest Cyber Security Strategies in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

2018: Cyberthreat Predictions & Security Strategy
sponsored by Aruba Networks
VIDEO: With major breaches exposing a vast amount of personal information and disruptive ransomware attacks shaking the world, it is critical to examine the lessons learn from these events to shape a strategy. In this webinar, listen to a panel of security experts as they discuss.
Posted: 10 Aug 2018 | Premiered: 02 Aug 2018

Aruba Networks

Reducing Cyber Exposure from Cloud to Containers: 5 Key Learnings from the CISO POV
sponsored by Tenable
RESOURCE: To combat the issue of cyber risk, a discipline called cyber exposure is emerging to help organizations manage and measure their risk. In this e-book, uncover insights from CISOs on how they are addressing the modern attack surface, including 5 key takeaways on their cyber exposure journey.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

Tenable

Help for CISOs Overwhelmed by Cybersecurity Threats
sponsored by MASERGY
WHITE PAPER: Find out how to build your security strategy on a foundation of executive and senior IT-level collaboration, supported by managed detection and response services.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

MASERGY

Resilient Security Architectures: The Paradigm Shift is Here
sponsored by Ixia - Keysight
WHITE PAPER: In the current business climate, it's not a question of if your network will be attacked, but when it will be attacked and how. Learn about a new paradigm shift that's emerging in response to this pressure called security resilience.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Ixia - Keysight

How C-Suite Leaders Win By Understanding the Role of the CISO
sponsored by Dell SecureWorks
WHITE PAPER: This white paper details the role of the CISO, taking an in-depth look at how CISOs can strike the right balance between organizational strategy and risk management.
Posted: 27 Apr 2018 | Published: 31 Dec 2017

Dell SecureWorks

The Voice of the Enterprise CISO
sponsored by NSS Labs
WHITE PAPER: According to the 2017 Verizon DBIR, approximately 90% of all security incidents and breaches involve some form of phishing attack. This white paper uncovers the biggest challenges for security leaders and offers strategies for combatting such challenges.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

NSS Labs

7 Critical Factors for an Optimized IAM Security Investment
sponsored by Edgile
WHITE PAPER: With security breaches dominating the headlines, CISOs find themselves fighting fires, rather than strategically planning. This resource offers a strategy-first approach allowing CISOs to build better long term investments and stay more secure.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Edgile

What Keeps Me Up At Night?: Concerns of a CISO
sponsored by enSilo
WEBCAST: Watch this webcast to uncover a list of security concerns facing CISOs today as well as pre-infection protection strategies to lessen these concerns.
Posted: 19 Jan 2018 | Premiered: Jan 19, 2018


Four CISO Tribes and Where to Find Them
sponsored by Synopsys
WHITE PAPER: In this research content, gathered based on interviews with 25 CISOs, discover 4 distinct approaches to the role of CISO. Learn what makes each one distinct, how you can use this information to push your own career forward, and more.
Posted: 18 Jan 2018 | Published: 29 Dec 2017

Synopsys

The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

Aruba 360 Secure Fabric: A User-centric Approach to Network Security
sponsored by Aruba Networks
WHITE PAPER: Find out how network business decision-makers, CISOs, and other network security leaders can get involved and meet the challenges of mobile, cloud, and IoT head-on.
Posted: 07 Jun 2018 | Published: 31 Mar 2018

Aruba Networks

How to Become a Superstar Security Leader
sponsored by Google Cloud
RESEARCH CONTENT: Be the superstar security leader your fellow executives need. This report looks at the biggest changes in firms' expectations of their CISOs and provides specific examples of how top information security professionals rise to those occasions. Download the Forrester report today and secure your future.
Posted: 08 Aug 2017 | Published: 13 Feb 2017

Google Cloud

Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by SearchSecurity.com
EZINE: Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

SearchSecurity.com

Securing DevOps
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

SearchSecurity.com

CISOs Are Under Mounting Pressure
sponsored by MASERGY
ANALYST BRIEF: CISOs need help. The smart ones are turning to a new way of thinking about cybersecurity protection: Security as a Service. It's a managed, unified solution that leverages the power of both machine learning and expert human intelligence. Discover the scalability and speed SaaS can add to your organization.
Posted: 03 Jun 2016 | Published: 13 Jan 2015

MASERGY

Elevate's CISO Explains Why He Switched Managed Security Providers
sponsored by MASERGY
VIDEO: One CISO was unhappy with the level of service from their managed security provider and decided to look for a new one. Watch this quick, 2-minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons, and why he chose to go with the provider he did.
Posted: 31 May 2016 | Premiered: 25 May 2016

MASERGY

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Are You Ready for the Future of IT?
sponsored by Cisco Systems, Inc.
WHITE PAPER: The Internet of Everything is here: More people, processes, data and things are connecting. Learn why you should embrace this new model.
Posted: 21 Aug 2014 | Published: 14 Mar 2014

Cisco Systems, Inc.

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM
1 - 25 of 44 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement