CIO Briefings

Information security and risk management guides for CIOs

Keeping your IT organization safe and secure is one battle. Doing it while staying in compliance with all applicable laws and regulations is another. These CIO Briefings will help you focus on information security and risk management. For information on other topics for CIOs and senior-level IT professionals, check out our CIO Briefings directory.

Business continuity and DR planning for CIOs

Disaster recovery (DR) planning is key to business continuity and data integrity. In other words, if you're not prepared for the worst, that's what you just might get. This CIO Briefing lays out the foundation for a solid DR plan.

Data protection services and strategies

This data protection guide for enterprise CIOs contains case studies on network access control, information on securing data for government compliance, data protection strategies, tools, technologies and more.

E-discovery and litigation for CIOs

Electronic discovery -- commonly referred to as e-discovery -- can add even more burdens to an already overworked IT staff, given the need to locate and secure specific information that may be used as evidence in a civil or criminal legal case. How does a CIO tackle these tasks in a cost-efficient manner while following the letter of the law? And what other potential litigation landmines are there for IT leaders? Learn what IT professionals need to watch out for to stay on the right side of the law with this CIO Briefing.

Information security policies and practices

The right information security policies and practices can keep your company's IT network secure and safe from the seemingly infinite number of threats via the Internet.

Regulatory compliance for CIOs

Compliance regulations, data privacy rules and data security initiatives have presented today's IT executives with more legal issues than ever before. Use this guide as an important regulatory compliance resource for you and the rest of your IT department.

Risk management

Enterprise risk management programs buffer organizations from risky business practices. In this guide, learn how to employ enterprise risk management solutions in an organization.

This was first published in February 2011

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: