Content Vault : Security | Recommended Content
CIO Leadership, Security

Balancing Value, Costs, and Risk for an Effective Security Program

Blog-post by HP Security Strategists, Tue, 05/12/2015 - 22:29
HP Security Strategists

By HP Security Strategist Stan Wisseman

(1) (1)

Business Issues, Security

Breach response: How to prepare for the Inevitable

White Paper by John Dodge,
Community Manager

A comprehensive preparedness plan for security breaches is essential. No, critical. The average cost of cleaning up a security breach and the fallout has doubled since 2010 to an average of $12.7 million. And a breach can take up to 65.5 days to resolve.

The attached white paper describes in detail how to be ready when it happens if, indeed, a breach, occurs. Are you ready? Are you prepared? Is the right resolution team in place? 

 


Business Issues, CIO Leadership, Security

How CIOs build cred in the boardroom about security

#CIOchat 2-3 p.m. ET Thursday

Blog-post by John Dodge,
Community Manager
, Tue, 04/28/2015 - 15:18

How involved should corporate boards be with cyber security? How much information should the CIO or CISO provide to the board and how should they frame it? Is the board getting the right information and enough or it?

(3)
   
(1) (1)

Business Issues, Cloud, Security

Evolution of a #CIOchat cloud question

Watch the video!

Blog-post by John Dodge,
Community Manager
, Mon, 04/06/2015 - 16:13

My longtime friend and colleague Charlie Cooper (@coopeydoop) suggested the following #CIOchat question a few weeks ago: "How long before CIOs lose their fears about the security in moving their data to the cloud?"

It's a good question, but I anticipated many of the CIOs in our weekly #CIOchat would respond that no one in the enterprise should ever lose their fears about security. The inference of the question as constructed is that adopting the cloud outweighs security concerns.

(1) (1)

CIO Leadership, Security

Executive Priorities – Balancing Security and Usability

Blog-post by Rafal Los, Tue, 04/07/2015 - 01:21
Wh1t3Rabbit

Cross-posted from my regular contributed column on Norse Security's Dark Matters.

(1)
   

Business Issues, Big Data, Cloud, Security

Wanted: Permanent and empowered CIO to clean up Library of Congress IT

World's largest library adds 12,000 new items every day.

Blog-post by John Dodge,
Community Manager
, Thu, 04/02/2015 - 15:57

Weaknesses in security, strategic planning, its IT investments, service management and perhaps most critically, leadership, has prompted the General Account Office to urge to Library of Congress to appoint permanent CIO pronto.

The stinging 133-page report from the GAO was released two days ago. So what's the problem?

(2)
   
(2) (2)

Technology, Big Data, Security

Big Data: Trust No One

A Big Data Take on the Zero Trust Model

Blog-post by jamal khawaja, Tue, 03/31/2015 - 16:32

What do Home Depot, JP Morgan Chase, Sony, Apple, Ebay, PF Chang’s, and Domino’s Pizza have in common? 

In three words: pwned by hackers.

(2)
   
(4) (4)

Technology, IT Infrastructure, Security

Four steps: The CIO’s guide to infrastructure cyber security

Blog-post by Gene De Libero, Sun, 03/15/2015 - 00:27

Cybersecurity is the number one concern for CIOs in state security for 2015 – and no wonder. State security systems house an enormous amount of data on any number of people, organizations, and even infrastructures – but keeping your organization’s data safe is just as important.

(5)
   
(1) (1)

CIO Leadership, Technology, Security

Protecting Source Code and Other IP with Behavioral Analytics

Blog-post by Stephan Jou, Mon, 03/09/2015 - 15:16

Nothing shakes the worlds of those in charge of businesses, engineering teams or information technology more than an attack on their intellectual property (IP): the source code, product designs, formulae, process engineering documents and related assets that are a company's most valuable IP.

(4)
   
(2) (2)

Business Issues, Security

Is sharing cyber security information with the Feds a good idea?

#CIOchat explores this explosive issue Thursday, 2-3 p.m. ET.

Blog-post by John Dodge,
Community Manager
, Mon, 02/23/2015 - 20:41

President Obama made an impassioned plea at the Feb. 13 Cyber Security Summit for the private sector and the federal government to exchange cyber threat information. The idea is simple: teaming up is better than separately waging the war against cyber terrorism, spying and crime.

(6)
   
(1) (1)