“When I need an answer to a tough problem, Wisegate is my trusted partner. They give me access to expertise from people who have been in similar situations and have overcome similar challenges. They eliminate vendor bias, delivering answers that are relevant, practical, and proven effective by my peers.”
—Chris Kellogg, Director, Controls, Governance, Risk Management, DynCorp International LLC

Wisdom Unveiled

When you work with an exclusive, vetted group of senior-level IT professionals, the learning is continuous. Wisegate members benefit from insights into what their peers are doing, learning from both successes and failures.

These resources offer a small window into the type of Wisegate content shared among our members.

 

Featured Resource:

Featured Resource: Infographic: The Evolution of IT from 2014 to 2015

As the IT expert’s always-available door to knock on for all IT questions and challenges, Wisegate reviewed our inquiries, roundtables, surveys, requests and networking forums to summarize what was top of mind in IT for 2014. Even more valuable may be how these topics have shifted as we round the corner into 2015. This infographic sums up what kept IT pros up at night in 2014, and what is threatening to do so in the new year.

Download Now

 

Reports & Studies

library_buttingheads
Survey Results 2014: IT Company Culture
library_assessing_security_risks
Assessing and Managing IT Security Risks
library_maximizing_it_career
Real Practices 2014: Maximize your IT Career
library_jobhunting
5 Tips Every Job-Hunting IT Pro Should Know

 

library_softskills
Hello, I Must Be Going: Hard Facts on Soft Skills
library_securityawareness
Security Awareness Programs: CISOs Share Simple, Practical Strategies
library_2014_top5_threats
The Snowden Effect: Top 5 Security Threats
library_aws
Real Practices 2014: Amazon’s Silver Linings

 

library_IdentityandAccess
2014 Identity and Access Management Maturity
library_sampleRFP
Sample RFP Questions for Managed Security Services
library_cisoSoftSkills
A CISO Handbook on Effective Leadership & the Art of Influencing People
library_cisoDiscussBudget
CISOs Discuss Best Ways to Gain Budget and Buy-in for Security

 

library_itSecurityBenchmark
2013 IT Security Benchmark Summary Report
library_bakingbettersecurity
CISO Tips for Baking Better Security into Applications
library_cisoprovideadvice
CISOs Provide Advice on Balancing Security vs. Privacy
library_cisotop10tips
CISOs Share Top 10 Tips for Managing Vendors

 

library_cisocrowdsourced
How a CISO Crowd-sourced a Successful Business Case for GRC
library_cloudsilverlining
Does Every Cloud Have a Silver Lining? A Cloud Assessment Case Study
library_byoxcasestudies
BYOx Case Studies: Three CISOs Tackle Employee-Owned Apps & Services
library_movingfromcompliance
Moving From Compliance To Risk-Based Security: CISOs Reveal Practical Tips

 

library_securebyod
CSO Peers Share Their Latest Strategies for Enabling Secure BYOD
library_improvesecurityawareness
CISOs Share Practical Ways to Improve Security Awareness
library_topthreats2013
Preparing for the Top IT Security Threats of 2013
library_samplemobilepolicy
Sample Corporate Mobile Device Acceptable Use and Security Policy

 

library_rolebasedaccess
Role Based Access Control: How-to Tips and Lessons Learned from IT Peers
library_recoveryplanning
Disaster Recovery Planning: IT Peers Discuss Making Trade-offs & Getting Buy-in
library_peeradviceBYOD
IT Peers Share Advice on Effective “Bring Your Own
Device” (BYOD) Strategies
library_rolebasedaccess
Role Based Access Control: How-to Tips and Lessons Learned from IT Peers

 

library_infosecuritytips
Info Security & Compliance Project Success Tips from Veteran Security Execs
library_3ways
3 Ways to Quickly Implement Single Sign On
library_reducingrisk
Reducing Risk in IT Decisions

Infographics

wisegate-infographic-security-innovation
Investing in Security Innovation
library_infographic_securityawareness
CISO’s Top 4 Security Awareness Strategies
Top 5 Security Threats
2014 Top 5 Security Concerns
wisegate_infographic_identity
Wisegate Answers: Identity and Access Management

 

library_infographic_cloud
Wisegate Answers: Cloud Computing Services
library_infographic_benchmark
Wisegate 2013 Security Benchmark Report Highlights
library_infographic_erptransformation_sm
CISO Roundtable Highlight: ERP Transformation – A Euphemism for Downsizing
library_infographic_whitelisting_sm
CISO Roundtable Recap: Application Whitelisting

 

library_infographic_cisoroundtable_sm
CISO Roundtable Highlight: What Can We Learn from 2014′s Big Incidents

Videos

webinar_thumb
WiseBrew Webinar: What Do IT Leaders Want, and Why Are They Leaving to Find It?
video_thumb_coffeetalk1
WiseBrew Coffee Talk: Wisegate 2.0 — Launching into Success
video_thumb_coffeetalk2
WiseBrew Coffee Talk: Amazon Web Services & the Cloud
 

Request an Invite:

Want to join a community of the top experts in IT? Request an invitation to Wisegate. Do I qualify?

REQUEST INVITE

What's Trending:

Want to see a sample of what are our members asking about this week?

SEE WHAT'S TRENDING

How it Works:

Want to see what the Wisegate experience is all about and learn how our system works?

TAKE A TOUR
homeicon_globe

Stay in the Know:

Get email alerts whenever we add new reports and studies to our resource library.

SIGN UP FOR ALERTS