cisos

Results 1 - 25 of 77Sort Results By: Published Date | Title | Company Name
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isnt showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a companys internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a companys data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr fr einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafr, dass es einfacher wird. Bei so vielen Datenversten, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschrften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu berdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenber ihren Kunden und Aktionren verp?ichtet, Daten zu schtzen und ihre Gefhrdung nicht nur gegenber externen Angreifern, sondern auch gegenber Mitarbeitern zu minimieren. Die im Jahr 2017 am hu?gsten genutzte Methode fr Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenversten im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: ber 80% der erfolgreichen Cyber-An
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 14, 2019
2017 war kein einfaches Jahr fr einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafr, dass es einfacher wird. Bei so vielen Datenversten, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschrften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu berdenken.
Tags : 
    
Infinidat EMEA
Published By: TIBCO Software     Published Date: Sep 16, 2019
A transformao digital da maior instituio de servios financeiros familiar dos Estados Unidos, com uma histria que remonta a trs geraes. Saiba como o papel dos dados mudou no banco durante uma evoluo contnua da experincia do cliente. O First Citizens Bank vem utilizando a tecnologia de integrao e anlise avanada da TIBCO para oferecer uma experincia de autoatendimento contnuo e consistente ao cliente, com o objetivo de combater fraudes e fornecer servios financeiros mais precisos e proativos.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
La transformacin digital de la institucin de servicios financiera familiar ms grande de Amrica, con una historia que data de tres generaciones atrs. Entrese de cmo la funcin de los datos cambi en el banco durante la evolucin de la experiencia del cliente. First Citizens Bank ha estado utilizando la integracin y la tecnologa analtica avanzada de TIBCO para ofrecer a sus clientes una experiencia de autoservicio consistente y continua, con el propsito de combatir el fraude y brindar servicios financieros ms precisos y proactivos.
Tags : 
    
TIBCO Software
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless youve achieved that digital data nirvana (and you havent told the rest of us), youre going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: SAP SME     Published Date: May 09, 2017
No aconteceu de um dia para o outro, mas aconteceu. A comoditizao e a concorrncia global aumentaram a presso em quase todos os setores. Para piorar a situao, os mercados inanceiros tornaram-se mais exigentes do que nas dcadas anteriores. Todos procuram o crescimento sustentvel, mas poucos encontram a frmula secreta para o conseguir. O que isso tem a ver com engajamento? Tudo. As empresas otimizaram suas operaes para obterem ganhos precisos. Os CEOs esto virando sua ateno para as equipes centradas no cliente marketing, vendas, comrcio e atendimento ao cliente para atrarem mais clientes e manterem relacionamentos mais profundos com eles. As regras do jogo mudaram.
Tags : 
    
SAP SME
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinets 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA
Published By: MobileIron     Published Date: May 12, 2015
This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
android for work, mobileiron, fragmentation, malicious app store activity, security gaps, compliance, lollipop
    
MobileIron
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, its not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology, data management
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, its not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid, access control, application security
    
Blue Coat Systems
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in todays world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, its fair to say the perimeter has left the premises. Whether its discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, todays attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"CISOs and other security leaders know they can't find and fix every vulnerability. Yet, that's whats expected. So, what can you do? The short answer: Work smarter, not harder. To do that, you need to reduce the vast universe of potential vulnerabilities down to a subset of the vulnerabilities that matter most. Download the How to Prioritize Cybersecurity Risks: A Primer for CISOs ebook now to learn: -How to adopt a risk-based approach to prioritization beyond what CVSS scores tell you -Why visibility into all your companys IT assets is key to understanding the scope of vulnerabilities and taking appropriate remedial action -How to change the conversation from How many vulnerabilities do we have? to Which vulnerabilities pose the greatest risk?"
Tags : 
    
Tenable
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: Mimecast     Published Date: Mar 19, 2019
An Executive Strategy Guide Brought To You By The Cyber Resilience Think Tank Big budget or not, CISOs must make threat intelligence a priority and learn how to focus on only the data that mattersdata that will help mitigate future risks. Though the technical definition of threat intelligence may change depending on who you ask, one factor remains constant: If threat intelligence isnt part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. Read this Cyber Resilience Think Tank executive strategy guide to develop a plan to architect a threat intelligence program in your organization.
Tags : 
    
Mimecast
Published By: Splunk     Published Date: Aug 22, 2018
Gartner's 2017 Critical Capabilities for Security Information and Event Management report assesses eight SIEM capabilities against the increasingly complex vendor landscape. The conclusion? Splunk had the highest score in the Security Monitoring use case. We believe customers rely on Splunks advanced security analytics capabilities to meet their SIEM and security intelligence needs improving threat detection, investigation and time to remediation. Its proven to help with compliance and incident reporting, automated alerting of common security events and historical analysis for detected incidents. CISOs, CIOs, and security and risk leaders should download Gartners annual report to make the best-informed buying decision for security and learn about Splunks leadership position in the market.
Tags : 
    
Splunk
Published By: McAfee     Published Date: Jan 20, 2015
CIOs and CISOs can avoid risky tradeoffs by deploying next-generation firewalls that are built for both security and network performance.
Tags : 
next generation firewall, network performance, mcafee next generation firewall, ngfw, networking, firewalls, internet security
    
McAfee
Published By: Lookout     Published Date: Mar 29, 2017
Mobile security is making the role of todays CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
webinar, mobile security, ciso, lookout
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
The adoption of mobile in the enterprise space is accelerating. Users of mobile devices choose what applications they want to use, but it is up to the enterprise to predict the data that they will be accessing. With that change, comes a new spectrum of risk that CISOs must consider.
Tags : 
mobile security, mobile devices, device security, enterprise mobile security, enterprise mobile management
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2018
Mobile security is making the role of todays CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
    
Lookout
Published By: Google     Published Date: Aug 09, 2017
This report looks at the biggest changes in firms expectations of their chief information security officers (CiSOs) and provides specific examples of how top information security professionals rise to those occasions.
Tags : 
security, ciso, chief information security officers, performance, customer experience, customer engagement
    
Google
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.