Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022
|
|
|
Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE:
In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012
|
|
|
Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER:
Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011
|
|
|
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER:
This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012
|
|
|
Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT:
This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013
|
|
|
The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT:
This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012
|
|
|
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER:
This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012
|
|
|
Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER:
In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008
|
|
|
Minimizing Cyber Risk with Better Threat Detection and Incident Response
sponsored by TechTarget Security
EZINE:
Today's security incident response must cope with an increasing onslaught of sophisticated attacks. Learn how to automate and collaborate better on your organization's incident response through threat detection, IR tools, and more.
Posted: 16 Nov 2016 | Published: 11 Nov 2016
|
|
|
Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST:
This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014
|
|
|
What to Look for in Incident Response Management Tools
sponsored by TechTarget Security
EBOOK:
Breaches are inevitable, so an effective incident response toolkit is essential. In this buyer's guide, learn the current and upcoming requirements for IR tools and what features are most vital.
Posted: 29 Nov 2016 | Published: 29 Nov 2016
|
|
|
Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE:
Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020
|
|
|
How to Make the Most of your Detection and Response
sponsored by Respond Software
EGUIDE:
Learn from Gartner analyst Anton Chuvakin and Drew Conry-Murray from Packet Pushers, about incident detection and response processes that an organization needs when starting out.
Posted: 23 May 2018 | Published: 18 May 2018
|
|
|
Disrupt Targeted Attacks
sponsored by Intel Security
WHITE PAPER:
Incident response teams are overwhelmed with work. Learn best practices for embracing an adaptive security model.
Posted: 21 Sep 2016 | Published: 21 Sep 2016
|
|
|
What the Integrity360 Cyber Incident Response Team thinks organisations need to consider heading into 2023
sponsored by Integrity360
BLOG:
With 2023 on the horizon, establishing cybersecurity priorities for the new year is crucial. But what should these priorities be? This blog suggests 3 considerations for cybersecurity professionals to keep top of mind. #1: If you haven’t yet, implement extensive centralized logging. Continue on to unlock the remaining tips.
Posted: 08 Dec 2022 | Published: 08 Dec 2022
|
|
|
Importance of Incident Response Collaboration
sponsored by Dimension Data
EGUIDE:
This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.
Posted: 22 Sep 2016 | Published: 21 Sep 2016
|
|
|
Incident response playbook in flux as services, tools arrive
sponsored by TechTarget Security
EBOOK:
The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
Posted: 12 Feb 2019 | Published: 12 Feb 2019
|
|
|
CW APAC - March 2020: Expert Advice: Security Operations Centre
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
Posted: 12 Mar 2020 | Published: 19 Mar 2020
|
|
|
Presentation Transcript: Incident Response - Are you prepared?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:
In this presentation transcript, Lee Lawson, Head of Response Service for Dell SecureWorks EMEA outlines a successful Incident Response approach and best practices for your organisation.
Posted: 30 Aug 2011 | Published: 30 Aug 2011
|
|
|
How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
sponsored by TaaSera
EGUIDE:
This expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
Posted: 02 Dec 2014 | Published: 02 Dec 2014
|
|
|
Endace Video 3
sponsored by Endace
VIDEO:
Increasingly complex cyberthreats continue to overwhelm security teams, sending many on the hunt for tools that can augment their incident response measures. To help teams do so, Elastic and Endace developed technologies that can accelerate incident response. Watch this video to learn more.
Posted: 23 Mar 2023 | Premiered: 23 Mar 2023
|
|
|
Who needs security orchestration, automation and response?
sponsored by TechTarget Security
EBOOK:
Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.
Posted: 17 Apr 2019 | Published: 17 Apr 2019
|
|
|
Your Guide to Threat Intelligence, AI & Incident Response
sponsored by Dell SecureWorks
EGUIDE:
Organizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.
Posted: 27 Mar 2020 | Published: 27 Mar 2020
|
|
|
All the Ingredients for a Solid Security Incident Response Plan
sponsored by Dell SecureWorks
EGUIDE:
Access this expert e-guide that presents the crucial steps in creating a solid security incident response plan, and the benefits one will bring to your organization.
Posted: 11 Feb 2013 | Published: 11 Feb 2013
|
|
|
How to Create a Ransomware Incident Response Plan
sponsored by DigitalXRAID
EGUIDE:
Ransomware is rapidly becoming one of today’s most persistent (and potentially devastating) cyberthreats. In fact, according to Forbes, the average amount of reported ransomware transactions per month in 2021 was $102.3 million. Read this e-guide to unlock 9-steps designed to help you build an effective ransomware mitigation strategy.
Posted: 28 Dec 2021 | Published: 28 Dec 2021
|
|
|
Building a PSIRT from the Ground Up
sponsored by Cybellum
WHITE PAPER:
As operational technology expands in manufacturing, the connectivity that it brings can introduce security risks to connected products and devices. To ensure a solid security posture while leveraging today’s technology, you should consider establishing a product security incident response team (PSIRT). Learn why in this white paper.
Posted: 14 Mar 2023 | Published: 14 Mar 2023
|
|
|
Ultimate Guide to Incident Response and Management
sponsored by Bottomline Technologies, Inc.
EGUIDE:
Incident response (IR) planning should be your top priority to minimize any security vulnerabilities that will allow hackers to invade your network. Take the survey to access the Ultimate Guide to Incident Response and Management.
Posted: 10 Dec 2021 | Published: 28 Oct 2021
|
All resources sponsored by Bottomline Technologies, Inc.
|
|
Build Multilayered Defense for the Cloud and Endpoints
sponsored by ConvergeOne
EGUIDE:
Creating a multilayered defense system within a network is necessary for advanced security protection. In this e-guide, security experts Frank Siemons and Ed Tittel discuss intrusion detection and prevention for the cloud and provide key criteria to evaluate endpoint security products for malware protection.
Posted: 14 Mar 2018 | Published: 12 Mar 2018
|
|
|
How to Use an Incident Response Policy to Better Collaborate
sponsored by Delta Risk
EGUIDE:
In this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.
Posted: 07 Oct 2016 | Published: 06 Oct 2016
|
|
|
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK:
Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014
|
|
|
Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE:
Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 08 Feb 2021 | Published: 23 Oct 2019
|
|
|
Royal Holloway: Corporate under-reporting of cyber crime
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
Posted: 26 May 2022 | Published: 26 May 2022
|
|
|
Incident Response Tools Can Help Automate Your Security
sponsored by Cisco Umbrella and Dimension Data
EGUIDE:
In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
Posted: 29 Mar 2017 | Published: 22 Mar 2017
|
|