Topics include allocating InfoSec budgets based on business needs, planning for emergencies, communicating the importance of security to upper management and gaining critical leadership buy-in.
Only Wisegate members have access to the full survey findings, however this summary report makes a portion of the results available to the broader Information Security community—including benchmark data and high-level analysis of the key factors that influence the effectiveness of security programs.
In most companies, security gets short changed during the application development process. This report offers an inside look at how other CISO’s and security leaders partner with business and development teams to build more secure business applications—with specific tips that will help you to mature security practices throughout the SDLC and advance your image as a business enabler vs. production gatekeeper.
Whether you are looking for general tips that will help you escape the negative stigma of IT security or more specific information on how to overcome employee privacy concerns and create acceptance for security programs—this report offers you an inside look at how other CISO’s approach security vs. privacy issues and provides a chance to learn from their experiences.
Whether you are looking for general tips that will help you make better purchase decisions or more specific information on how to keep vendors accountable or avoid unnecessary spending—this report offers you an inside look at how other CISOs manage this critical aspect of their work.
Whether you are looking for general tips that will help you define your own risk management strategy or more specific information on risk management tools and how to evaluate GRC vendors—this case study offers you an inside look at a CISO’s execution strategy and a chance to learn from her experiences.
Whether you are looking for general tips that will help you define your own cloud strategy or more specific information on evaluating cloud service providers—this case study offers you an inside look at a senior IT director’s cloud strategy and a chance to learn from his experiences.
Whether you are just beginning to tackle BYOx issues, or have mature policies in place, this report will give you new insights you can use to better balance worker productivity with security risks.
Get the straight scoop from security experts on the front lines, and find out how your organization stacks up. Learn what these leaders are really doing about top issues like Cloud Computing, BYOD, BYOx, Security Awareness, and others.
If you’d like to hear how other CISOs are successfully moving to risk-based security programs, download the report today. No vendor bias or analyst theories, just straight insight from experienced security professionals.
Download the report now for a first-hand look at what CSOs and other IT Security leaders have to say about BYOD, and their latest strategies for managing it.
Whether you are directly responsible for delivering Security Awareness in your organization, or just looking for new ways to help your organization better protect its data, these insights from IT Security experts can help you simplify and improve your Security Awareness efforts.
Whether you are curious to learn what other CSOs are doing to stay one step ahead of these security threats – or just looking for useful tips that will help you build a more effective security program in 2013 – this is your chance to learn from some of the most respected IT leaders in industry.
Many CISOs are joining Wisegate to learn directly from their peers what's working and what's for BYOD, and to share experiences and even their actual policies. This document is one example of a BYOD policy that was shared on Wisegate by a CISO of a large Insurance Company, and defines policies for a broad range of issues related to employee-owned mobile devices.
As companies increasingly deal with privacy and risk issues, the role of chief information security officers (CISOs) is expanding beyond information security programs to include information risk management and privacy portfolios. In this report, you'll learn how top CISO's are bringing together these previously separate disciplines, and successfully coping with the new challenges that this expanding role brings.
For anyone just getting started with a public cloud-based application deployment, there is a steep learning curve. Cloud computing introduces new challenges that must be understood and risks that must be mitigated. From this report you will gain real world knowledge about cloud advantages and pitfalls, as well as specific deployment considerations can make the difference between project success and failure.
Whether you are just starting out, or updating your current DR plan – this is your chance to hear from your peers about their experiences with different DR solutions, and how they approached building a successful but cost-effective DR plan.
Whether you are looking for specific information on which mobile operating systems or mobile device management (MDM) solutions your peers trust most – or just looking for tips that will help you build effective BYOD corporate policies – this is your chance to learn from some of the most respected IT leaders in industry.
An effective RBAC program offers significant benefits for an organization in terms of improved security, compliance and administration, but can be a very challenging undertaking. Whether you are trying to figure out how to get started with RBAC, or just wanting to know how others are handling ongoing RBAC challenges – this is your chance to learn from those who have been through it, and know how to make RBAC successful.
Whether you are looking for specific pointers on how to run a successful Governance, Risk and Compliance (GRC), Identity and Access Management (IAM), or Security Information and Event Management (SIEM) project – or just looking for tips that apply generically to any type of IT or security implementation – this is your chance to learn from some of the best IT leaders in industry.
There are just about as many paths to SSO as there are identity management vendors, but which path would you choose if you needed to quickly set up SSO across four silo'd online services?
Gain a snapshot view of how an IT Director of Identity Management Technology used the Wisegate community to gather pragmatic feedback from his peers before making his final project recommendations.
This report examines how IT professionals attempt to find the practical information they need to make critical decisions and provides analysis of the the roadblocks they encounter along the way.
With prescriptive solutions on how busy professionals can simplify and improve their information-gathering efforts, this paper offers useful advice to help IT leaders reduce risk in IT decisions.