Chief Information Security Officers Reports

The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

TechTarget ComputerWeekly.com

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee
sponsored by Information Security Magazine
EZINE: This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.
Posted: 07 May 2009 | Published: 01 Jan 2009

Information Security Magazine

How to Overcome Security Skills Deficiencies
sponsored by IBM
WHITE PAPER: This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance
sponsored by Silver Tail Systems
EGUIDE: This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.
Posted: 22 Feb 2011 | Published: 22 Feb 2011

Silver Tail Systems

Data Protection 2.0: It’s Not Just Names and Numbers Anymore
sponsored by Tripwire, Inc.
WHITE PAPER: The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protec­tion requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

The CISOs Guide to Measuring IT Security
sponsored by Lumension
WHITE PAPER: In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Lumension

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by TechTarget Security
EZINE: Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

TechTarget Security

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security
sponsored by Tripwire, Inc.
WHITE PAPER: Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.