Despite substantial efforts to contain them, threats to cybersecurity continue to grow and are expected to get worse before they get better, according to experts. In our annual IT priorities survey of nearly 400 North American IT professionals, security once again was identified as an area in which a considerable percentage of IT professionals -- 22% in this year's survey -- devote most of their time. To make sure that time isn't spent treading water, CIOs and IT executives need to develop an IT security strategy that utilizes the right tools and encompasses the many facets of IT -- from mobile and cloud to IoT and analytics and everything in between.
In this Essential Guide, explore the cybersecurity landscape and absorb the latest information around next-generation security architectures, attack detection and response, governmental intervention in the professional threat economy and how companies are handling data breaches.
Our Essential Guides are designed to give IT leaders strategic management and decision-making advice on timely technology topics.
1IT security strategy overview-
Designing your cybersecurity roadmap
Due to the continuous onslaught of cyberthreats and the immeasurable number of approaches IT executives can take in the defense against such threats, choosing the right IT security strategy for your organization isn't easy. This section simplifies things for you by delving into next-gen security architecture and tips and best practices for combatting today's cyberthreats.
In this Q&A with Nemertes Research CEO Johna Till Johnson, learn why now is the time to move to a next-generation security architecture and get strategic best practices for getting the job done. Continue Reading
When planning out how to handle a data breach, special consideration should be given to managing public perception. One piece of advice from MIT research: Don't play the victim. Continue Reading
Rather than securing systems against cyberattacks, CIOs should start practicing digital resilience, according to a new book from the World Economic Forum and McKinsey & Company. Continue Reading
When it comes to IT security, culture is king
Sometimes the biggest security threat can come from within. Without the right environment, mindset and personnel, an organization's IT security is put at risk. In this section, learn how important it is to inform your people and promote a culture of security at your organization.
Human error remains a constant among the top threats to information security. Here, Niel Nickolaisen offers three pieces of advice for mitigating our mistakes. Continue Reading
In this video interview, Marci McCarthy, CEO and president at Tech Exec Networks, discusses information security best practices and why end-user security awareness is the front line of corporate data protection efforts. Continue Reading
Many organizations strive to make creating a "culture of security" a priority, but doing so requires business leaders to reexamine data protection's role in bottom-line success. Continue Reading
This blog post details why relationship building and top-down employee support is necessary in information security. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Mobile security is in your hands
If you're not focusing security efforts on mobile, think again. The number of mobile devices now outnumbers the number of people in the world, making securing those devices -- through next-gen tools and some forward thinking -- a priority for any organization. In this section, get tips on how to address mobile security concerns.
Mobile payment systems ignite fear among infosec pros, but customer trust and convenience overshadow security concerns at their organizations. Continue Reading
Mobile security threats, such as malware and file-sharing data leakage, are escalating across the enterprise. IT needs strong best practices to mitigate these threats. Continue Reading
Developing a cloud security strategy
As organizations move more and more data to the cloud, cultivating a cloud security strategy is becoming a top CIO imperative. In this section, discover tools and best practices for improving your organization's cloud security.
Cultivating a cloud security culture and enlisting a CISO are vital to organizations in the cloud computing era, a new report shows. Continue Reading
Now more than ever, university IT departments have the difficult task of maintaining a culture of openness while protecting against growing security threats. Continue Reading
When it comes to cloud computing options, security is a top consideration, according to Todd Miller, director of operations, IT and facilities at medical products manufacturer Millar. Continue Reading
A cloud access security broker is a good cloud security tool that serves as a gatekeeper to your organization's systems and loops in whatever security policies you already have in place. Continue Reading
Security in an increasingly connected world
IoT devices are proliferating at a rapid rate. And the more connected we get the more important it becomes to protect the massive amount of data involved. That's why IoT security is becoming a vital part of any organizations security roadmap. In this section, explore the biggest security concerns raised by IoT and get tips for addressing them.
MIT cybersecurity expert Stuart Madnick says we're woefully unprepared to protect the proliferating population of IoT-enabled devices. Continue Reading
According to experts at RSA Conference 2016, it's time for organizations to put IoT security first -- or risk the inevitable downfall of the internet of things. Continue Reading
this video, vArmour CISO Demetrios Lazarikos discusses how companies' efforts to secure IoT devices are influencing their overall infosec strategy. Continue Reading
As the internet of things grows, so will accompanying enterprise security challenges. In this webinar, learn how a lack of focus on IoT security challenges during the design stage could create numerous data protection vulnerabilities. Continue Reading
Don't spend more, spend right
Investing in security is always a good idea, but throwing money at the problem won't cut it. In this section, find out how to manage your IT security spending efficiently.
Prevention-focused security strategies won't thwart all threats. CIOs need to shift IT security budgets toward attack detection and response. Continue Reading
In this video interview, Jeff Reich, chief security officer at Barricade.io, discusses how embedding data protection efforts in corporate strategy can reduce information security costs. Continue Reading
A cybersecurity budget with no restrictions may sound like a dream, but it could actually harm enterprise security, says enterprise security management expert Mike O. Villegas. Continue Reading
7Security and the government-
Cybersecurity legislation and CIOs
Cybersecurity isn't just a business priority. Facing new pressures from today's increasing cyberthreats, the U.S. government is realizing it needs to step in to assess the IT security landscape and enact legislation to address some of the top concerns. In this section, find out how the government is responding to increasing IT security concerns and what impact it will have on IT executives.
A cyberattack on the power grid may be imminent, says Wisconsin's CIO. For an effective response, the public and private sectors need to work together. Continue Reading
The federal government is encouraging cybersecurity info sharing to offset threats to data, but some businesses are worried that the data protection measures might infringe on privacy. Continue Reading
Legislators have begun examining cryptocurrencies and blockchain security amid growing instances of cybercrime, such as the ransomware attacks on NYT and BBC. Continue Reading
8Security and analytics-
The devil's in the data
Don't underestimate the importance of data analytics in your IT security strategy. In this section, learn how to best tap analytics at your organization to identify, monitor and prevent threats from harming your data.
The rising number of attacks has led to a big increase in cybersecurity intelligence data that can be analyzed to prevent future incidents. But rapidly advancing technology makes it hard to stay ahead of the curve. Continue Reading
Amid continuous data breaches, companies are turning to data analytics to help identify vulnerabilities and make cybersecurity risk management more efficient. Continue Reading
Next-gen security analytics tools provide proactive and responsive analysis of security events. Nemertes Research CEO Johna Till Johnson explains. Continue Reading