“When I need an answer to a tough problem, Wisegate is my trusted partner. They give me access to expertise from people who have been in similar situations and have overcome similar challenges. They eliminate vendor bias, delivering answers that are relevant, practical, and proven effective by my peers.”
—Chris Kellogg, Director, Controls, Governance, Risk Management, DynCorp International LLC

Wisdom Unveiled

When you work with an exclusive, vetted group of senior-level IT professionals, the learning is continuous. Wisegate members benefit from insights into what their peers are doing, learning from both successes and failures.

These resources offer a small window into the type of Wisegate content shared among our members.

 

Featured — CISOs Checklist: Innovative & Practical Ways to Improve Security Awareness

With all of the worrying security threats, the end user is often one of the most commonly exploited security vulnerabilities. It is little wonder, then, that improving security awareness ranks high on the list of CISOs’ priorities. In this report, CISO members of Wisegate share their experiences, and offer a checklist of creative and effective ways to improve security awareness.  Download Now »

 

Peer-Based Research & Reports

research_EffectiveComm&Infl
CISOs Checklist: Effective Communication & Influence
research_ImproveSecurityAwareness
CISOs Checklist: Innovative & Practical Ways to Improve Security Awareness
research_BakingBetterSecurity
CISOs Checklist: Baking Better Security into Applications
research_ManagingVendors
CISOs Share Top 10 Tips for Managing Vendors

 

research_CompliancetoRiskSecurity
Moving from Compliance to Risk-Based Security: CISOs Reveal Practical Tips
research_BudgetBuyIn
CISOs Discuss Best Ways to Gain Budget and Buy-in for Security
research_DRPlanning
Disaster Recovery Planning: IT Peers Discuss Trade-offs & Getting Buy-in
research_ITDecisionGap
Bridging the IT Decision Gap

Shared Tools & Templates

research_SampleITRiskMatrix
Sample IT Risk Analysis Matrix
research_CorpMobileDevicePolicy
Sample Corporate Mobile Device Acceptable Use and Security Policy
research_RFPforManagedServices
Sample Request for Proposal (RFP) for Managed Security Services
research_IncidentResponse
Sample Security Incident Response and Reporting Procedures

Infographics