“When I need an answer to a tough problem, Wisegate is my trusted partner. They give me access to expertise from people who have been in similar situations and have overcome similar challenges. They eliminate vendor bias, delivering answers that are relevant, practical, and proven effective by my peers.”
—Chris Kellogg, Director, Controls, Governance, Risk Management, DynCorp International LLC

Wisdom Unveiled

When you work with an exclusive, vetted group of senior-level IT professionals, the learning is continuous. Wisegate members benefit from insights into what their peers are doing, learning from both successes and failures.

These resources offer a small window into the type of Wisegate content shared among our members.

Featured — What does Information Security have in common with Eastern Air Lines Flight 401?

It’s an odd question, with an important—and potentially tragic—answer. Information Security, with its sundry standards and glut of gizmos, has been on a nearly imperceptible descent for years. In this seven-part think piece, Wisegate member and security expert Martin Zinaich looks at the problems endemic to business and information security, how we got into this mess, and suggests ways to get out of this predicament. Download Now »

 

Wisegate Watch Newsletters

library_wisegatewatch_july15
July, 2015
library_wisegatewatch_june15
June, 2015
library_wisegatewatch_may15
May, 2015
library_wisegatewatch_april15
April, 2015

 

library_wisegatewatch_march15
March, 2015

Toolkits:

CoverMockup
Critical Resource: Geek Speak for the C-Suite
mockup
First 90 Days Onboarding Toolkit
mockup-1
Soft Skills Toolkit
CoverMockup
Assessing and Managing IT Security Risks Toolkit
CoverMockup
Developing an IT Security Strategy

Infographics

library_infographic_byod_sm
BYOD Policy: Best Practices & Tips
WG_Infographic_EvolutionofIT_sm
The Evolution of IT from 2014 to 2015
wisegate-infographic-security-innovation
Investing in Security Innovation
library_infographic_securityawareness
CISO’s Top 4 Security Awareness Strategies

 

Top 5 Security Threats
2014 Top 5 Security Concerns
wisegate_infographic_identity
Wisegate Answers: Identity and Access Management
library_infographic_cloud
Wisegate Answers: Cloud Computing Services
library_infographic_benchmark
Wisegate 2013 Security Benchmark Report Highlights

 

library_infographic_erptransformation_sm
CISO Roundtable Highlight: ERP Transformation – A Euphemism for Downsizing
library_infographic_whitelisting_sm
CISO Roundtable Recap: Application Whitelisting
library_infographic_cisoroundtable_sm
CISO Roundtable Highlight: What Can We Learn from 2014’s Big Incidents

 

Reports & Studies

library_malware
Malware and Data Breaches
library_datacentricsecurity
Data-centric Security
library_automationandorchestration
Automation and Orchestration: Harnessing Threat Intelligence for Better Incident Response
library_metrics
Wisegate Drill-Down: Metrics & Reporting – a Failure in Communication
library_buttingheads
Survey Results 2014: IT Company Culture
library_assessing_security_risks
Assessing and Managing IT Security Risks

 

library_maximizing_it_career
Real Practices 2014: Maximize your IT Career
library_jobhunting
5 Tips Every Job-Hunting IT Pro Should Know
library_softskills
Hello, I Must Be Going: Hard Facts on Soft Skills
library_securityawareness
Security Awareness Programs: CISOs Share Simple, Practical Strategies
library_2014_top5_threats
The Snowden Effect: Top 5 Security Threats
library_aws
Real Practices 2014: Amazon’s Silver Linings

 

library_IdentityandAccess
2014 Identity and Access Management Maturity
library_sampleRFP
Sample RFP Questions for Managed Security Services
library_cisoSoftSkills
A CISO Handbook on Effective Leadership & the Art of Influencing People
library_cisoDiscussBudget
CISOs Discuss Best Ways to Gain Budget and Buy-in for Security
library_itSecurityBenchmark
2013 IT Security Benchmark Summary Report
library_bakingbettersecurity
CISO Tips for Baking Better Security into Applications

 

library_cisoprovideadvice
CISOs Provide Advice on Balancing Security vs. Privacy
library_cisotop10tips
CISOs Share Top 10 Tips for Managing Vendors
library_cisocrowdsourced
How a CISO Crowd-sourced a Successful Business Case for GRC
library_cloudsilverlining
Does Every Cloud Have a Silver Lining? A Cloud Assessment Case Study
library_byoxcasestudies
BYOx Case Studies: Three CISOs Tackle Employee-Owned Apps & Services
library_movingfromcompliance
Moving From Compliance To Risk-Based Security: CISOs Reveal Practical Tips

 

library_securebyod
CSO Peers Share Their Latest Strategies for Enabling Secure BYOD
library_improvesecurityawareness
CISOs Share Practical Ways to Improve Security Awareness
library_topthreats2013
Preparing for the Top IT Security Threats of 2013
library_samplemobilepolicy
Sample Corporate Mobile Device Acceptable Use and Security Policy
library_rolebasedaccess
Role Based Access Control: How-to Tips and Lessons Learned from IT Peers
library_recoveryplanning
Disaster Recovery Planning: IT Peers Discuss Making Trade-offs & Getting Buy-in

 

library_peeradviceBYOD
IT Peers Share Advice on Effective “Bring Your Own
Device” (BYOD) Strategies
library_rolebasedaccess
Role Based Access Control: How-to Tips and Lessons Learned from IT Peers
library_infosecuritytips
Info Security & Compliance Project Success Tips from Veteran Security Execs
library_3ways
3 Ways to Quickly Implement Single Sign On
library_reducingrisk
Reducing Risk in IT Decisions

Videos

webinar_thumb
WiseBrew Webinar: What Do IT Leaders Want, and Why Are They Leaving to Find It?
video_thumb_coffeetalk1
WiseBrew Coffee Talk: Wisegate 2.0 — Launching into Success
video_thumb_coffeetalk2
WiseBrew Coffee Talk: Amazon Web Services & the Cloud