IT Agents  >   IT Workforce  >   Executive Management  >  

Information Security Officers

RSS Feed   
Information Security Officers Reports
 
The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

The Voice of the Enterprise CISO
sponsored by NSS Labs
WHITE PAPER: According to the 2017 Verizon DBIR, approximately 90% of all security incidents and breaches involve some form of phishing attack. This white paper uncovers the biggest challenges for security leaders and offers strategies for combatting such challenges.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

NSS Labs

An ESG Research Insights Report: Security Operations Challenges, Priorities, and Strategies
sponsored by Siemplify
RESEARCH CONTENT: This report on security operations issues offers suggestions to address these problems from cybersecurity professionals themselves.
Posted: 26 Sep 2018 | Published: 31 Mar 2017

Siemplify

Expert Guidance on Crafting Your Incident Response Plan
sponsored by TechTarget
RESOURCE: When a company is the victim of a breach, it must have a cybersecurity incident response plan in order to minimize business disruption and hack-related expenses. Participate in our Network Security survey today to download our guide Crafting a Cybersecurity Incident Response Plan, Step by Step that highlights how to get started with your plan.
Posted: 02 Oct 2018 | Published: 04 Dec 2018

TechTarget

Closing the Communication Gap Around Security & Digital Transformation
sponsored by Rackspace
EBOOK: Despite cybersecurity being front of mind for board members, many admit they do not have a strategy to tackle the 'how, what, where and why' questions related to data protection. Read on for an in-depth explanation of why the board and ITDMs need to close the communication gap around security and digital transformation, today.
Posted: 04 Oct 2018 | Published: 04 Oct 2018

Rackspace

Top 5 Least Privilege Reports CISOs Live For Implement Least Privilege for a Measurable Security Plan
sponsored by Thycotic
RESOURCE: Among all security strategies CISOs employ, the principle of least privilege is one that can draw a direct line from implementation to value. Download this resource to learn what it takes to implement least privilege in your organization, today.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Thycotic

Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by SearchSecurity.com
EZINE: Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

SearchSecurity.com

Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee
sponsored by Information Security Magazine
EZINE: This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.
Posted: 07 May 2009 | Published: 01 Jan 2009

Information Security Magazine

Elevate's CISO Explains Why He Switched Managed Security Providers
sponsored by MASERGY
VIDEO: One CISO was unhappy with the level of service from their managed security provider and decided to look for a new one. Watch this quick, 2-minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons, and why he chose to go with the provider he did.
Posted: 31 May 2016 | Premiered: 25 May 2016

MASERGY

How to Become a Superstar Security Leader
sponsored by Google Cloud
RESEARCH CONTENT: Be the superstar security leader your fellow executives need. This report looks at the biggest changes in firms' expectations of their CISOs and provides specific examples of how top information security professionals rise to those occasions. Download the Forrester report today and secure your future.
Posted: 08 Aug 2017 | Published: 13 Feb 2017

Google Cloud
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement