Get the straight scoop from security experts on the front lines, and find out how your organization stacks up. Learn what these leaders are really doing about top issues like Cloud Computing, BYOD, BYOx, Security Awareness, and others.
If you’d like to hear how other CISOs are successfully moving to risk-based security programs, download the report today. No vendor bias or analyst theories, just straight insight from experienced security professionals.
Download the report now for a first-hand look at what CSOs and other IT Security leaders have to say about BYOD, and their latest strategies for managing it.
Whether you are directly responsible for delivering Security Awareness in your organization, or just looking for new ways to help your organization better protect its data, these insights from IT Security experts can help you simplify and improve your Security Awareness efforts.
Whether you are curious to learn what other CSOs are doing to stay one step ahead of these security threats – or just looking for useful tips that will help you build a more effective security program in 2013 – this is your chance to learn from some of the most respected IT leaders in industry.
Many CISOs are joining Wisegate to learn directly from their peers what's working and what's for BYOD, and to share experiences and even their actual policies. This document is one example of a BYOD policy that was shared on Wisegate by a CISO of a large Insurance Company, and defines policies for a broad range of issues related to employee-owned mobile devices.
As companies increasingly deal with privacy and risk issues, the role of chief information security officers (CISOs) is expanding beyond information security programs to include information risk management and privacy portfolios. In this report, you'll learn how top CISO's are bringing together these previously separate disciplines, and successfully coping with the new challenges that this expanding role brings.
For anyone just getting started with a public cloud-based application deployment, there is a steep learning curve. Cloud computing introduces new challenges that must be understood and risks that must be mitigated. From this report you will gain real world knowledge about cloud advantages and pitfalls, as well as specific deployment considerations can make the difference between project success and failure.
Whether you are just starting out, or updating your current DR plan – this is your chance to hear from your peers about their experiences with different DR solutions, and how they approached building a successful but cost-effective DR plan.
Whether you are looking for specific information on which mobile operating systems or mobile device management (MDM) solutions your peers trust most – or just looking for tips that will help you build effective BYOD corporate policies – this is your chance to learn from some of the most respected IT leaders in industry.
An effective RBAC program offers significant benefits for an organization in terms of improved security, compliance and administration, but can be a very challenging undertaking. Whether you are trying to figure out how to get started with RBAC, or just wanting to know how others are handling ongoing RBAC challenges – this is your chance to learn from those who have been through it, and know how to make RBAC successful.
Whether you are looking for specific pointers on how to run a successful Governance, Risk and Compliance (GRC), Identity and Access Management (IAM), or Security Information and Event Management (SIEM) project – or just looking for tips that apply generically to any type of IT or security implementation – this is your chance to learn from some of the best IT leaders in industry.
There are just about as many paths to SSO as there are identity management vendors, but which path would you choose if you needed to quickly set up SSO across four silo'd online services?
Gain a snapshot view of how an IT Director of Identity Management Technology used the Wisegate community to gather pragmatic feedback from his peers before making his final project recommendations.
This report examines how IT professionals attempt to find the practical information they need to make critical decisions and provides analysis of the the roadblocks they encounter along the way.
With prescriptive solutions on how busy professionals can simplify and improve their information-gathering efforts, this paper offers useful advice to help IT leaders reduce risk in IT decisions.