IT Strategy

IT Strategy news, analysis, research, how-to, opinion, and video.

ransomware breach hackers dark web
8 small business security

security incident responders life preservers

Two incident response phases most organizations get wrong

It's important to remember: Incident response isn't a thing, it's a process.

balance - measure - comparison - risk assessment

Want IT resiliency? Stop the see-saw of imbalanced attention

As cyber threats continue to grow among companies with sensitive data, IT must take a holistic approach to managing and mitigating these threats. Here’s how to bridge preventative and restorative measures for IT resiliency.

teamwork - collaboration

4 steps to creating a winning cybersecurity strategy in 2018

For mid-sized organizations and enterprises looking to focus on cybersecurity issues in 2018, here is a proven playbook to help creating a winning strategy.

cils 011 technologysthat will disrupt 2
video

Technologies that will disrupt business in 2018

From artificial intelligence to augmented reality, these dozen disruptive technologies and trends will begin driving how business gets done at forward-thinking organizations this year.

fact fiction debunk myths truth

6 myths CEOs believe about security

Want a more effective IT security strategy? Dispel your CEO and senior management of these common cybersecurity misconceptions.

blue padlock in circle pixels digital security padlock

9 policies and procedures you need to know about if you’re starting a new security program

Any mature security program requires each of these infosec policies, documents and procedures.

business people conference room collaboration boardroom

Having a boardroom conversation about cybersecurity and material risk

Those who embrace a material risk approach to addressing cyber threats will command the attention of senior leaders and steadily drive improvements into their organization’s security posture.

multiple-exposure image showing virtual connections and software inside and outside a human profile

What is a virtual CISO? When and how to hire one

A virtual CISO (vCISO) can bring both strategic and operational leadership on security to companies that can't afford a full-time person in the role.

risk assessment - safety analysis - security audit

The time is now for a comprehensive, risk-based approach to build cyber resilience

Most C-suite stakeholders are unsure of where their organization stands in its cyber security capabilities and resilience.

strategic planning notes and ideas

Building a cybersecurity strategic plan

These types of plans are cybersecurity road maps that establish pathways an organization can follow to improve its overall risk management approach.

equations on chalkboard 87173350

Rewriting the security equation in 2018

Understanding the future impact of changes to the security landscape.

overwhelmed man stressed analytics information overload

The Importance of Discerning Between Job Burnout and PTSD

It is important to discuss the key differences between PTSD and burnout in order for us to avoid making light of a serious psychological disorder

win compet chess challenge strategy plan

Strategic security

Do you really want to keep solving the same security problems forever?

cloud security ts

4 things CISOs should stress to the board of directors about cloud security

It's essential for CISOs to get involved in the cloud conversation, so that they can communicate to those at the highest level of the organization why security should not be an afterthought.

security lock

New year provides enterprises prime opportunity to recalibrate security posture

There is no question we are living in times of turbulence, but these are also times of unprecedented opportunity for enterprises to harness technology to connect with customers in innovative ways.

network security digital internet firewall binary code

Penetration testing is a reference point, not a strategy

Pen tests are valuable only if the results are properly translated into an effective overall security strategy.

saas

Security platform or best of breed? There’s only one answer

How limited resources and the software as a service (SaaS) sales culture force security professionals into a best of breed strategy for infrastructure.

facial recognition - biometric security identification - binary face

GDPR turbocharges identity and access management spending

Thanks to the GDPR, the identity and access management (IAM) market is predicted to reach $16 billion by 2022.

Load More