Essential Guide

Get started Bring yourself up to speed with our introductory content.

An IT security strategy guide for CIOs

With cyberthreats continuing to grow in number and sophistication, security should be a top priority for CIOs -- now more than ever before. In this Essential Guide, learn how to combat cyberthreats and get expert advice on developing an effective IT security strategy.

Introduction

Despite substantial efforts to contain cybersecurity threats, they continue to grow and are expected to get worse before they get better, according to experts. In our annual IT priorities survey of nearly 971 North American IT professionals, security once again was identified as an area in which a considerable percentage of IT professionals -- 23% in this year's survey -- devote most of their time, second only to general IT management, which was cited by 27% of respondents. To make sure that time isn't spent treading water, CIOs and IT executives need to develop an IT security strategy that utilizes the right tools and encompasses the many facets of IT -- from mobile and cloud to IoT and analytics and everything in between.

In this Essential Guide, explore the cybersecurity landscape and absorb the latest information around next-generation security architectures, attack detection and response, governmental intervention in the professional threat economy and how companies are handling data breaches.

1IT security strategy overview-

Drafting your cybersecurity roadmap

Due to the continuous onslaught of cyberthreats and the immeasurable number of approaches IT executives can take in the defense against such threats, choosing the right IT security strategy for your organization isn't easy. This section simplifies things for you by exploring next-gen security architecture and offering tips and strategies for combatting today's cyberthreats.

Feature

Cybersecurity strategies for 2017

Security experts offer advice on the "resolutions" companies should be making to build a robust cybersecurity strategy this year. Continue Reading

Feature

Threat hunters: A new breed of security pros

As cyberattacks on the enterprise continue to grow in number, organizations need a new breed of security professionals that experts call "threat hunters." Read how threat hunters are emerging as a new line of defense against cyberattacks and how they can help you detect security incidents. Continue Reading

Blog Post

Tips on building a robust information security strategy

During a panel discussion sponsored by Women in Technology International, security experts offered advice about countering data breach threats and how organizations can strengthen their information security strategy. Continue Reading

Feature

Adopting a next-generation cybersecurity architecture

In this Q&A with Nemertes Research CEO Johna Till Johnson, learn why now is the time to move to a next-generation security architecture and get strategic best practices for getting the job done. Continue Reading

Tip

Current cybersecurity needs overhaul, experts say

Cybersecurity experts urge enterprises to embrace new tools, including micro-virtualization and intelligence-led security, to redeem "brittle" security systems. Continue Reading

Tip

Managing public perception following a data breach

When planning out how to handle a data breach, special consideration should be given to managing public perception. One piece of advice from MIT research: Don't play the victim. Continue Reading

Tip

Eight steps for building a data breach plan

Take these eight points into account when constructing a data breach plan that addresses the many variations a hack can take. Continue Reading

Tip

Creating a DR/BC strategy for the data breach age

In the current cyberthreat landscape, a good enterprise disaster recovery/business continuity plan must put data first, says Harvey Koeppel. He offers 10 tips for getting there. Continue Reading

Video

Modern infosec complicated by network growth

In this video interview, In-Q-Tel CISO and cybersecurity pioneer Dan Geer discusses modern information security and how network growth is influencing companies' data protection strategies. Continue Reading

Video

Crafting a better enterprise IT security roadmap

In this webcast, Johna Till Johnson of Nemertes Research explains how to develop a functional enterprise IT security roadmap for your organization. Continue Reading

2Security culture-

When it comes to IT security, culture is king

Sometimes the biggest security threat can come from within. Without the right environment, mindset and personnel, an organization's IT security is put at risk. In this section, learn how important it is to promote a culture of security at your organization and how to educate your employees on security best practices.

Feature

Human error continues to threaten companies' data security

In this Q&A with Bryan Sartin, managing director of the Verizon RISK Team, learn why human error remains among the biggest data security threats that organizations face today and the data security best practices that they should be implementing to offset breach vulnerabilities. Continue Reading

Feature

Ransomware detection: How to train your employees

Rohyt Belani, chief executive and co-founder of security firm PhishMe, explains how organizations can condition and train employees to help detect phishing scams, transforming them from being a liability to an asset when it comes to ransomware attacks. Continue Reading

Video

First step in data protection: End-user security awareness

In this video interview, Marci McCarthy, CEO and president of Tech Exec Networks, discusses information security best practices and why end-user security awareness is the front line of corporate data protection efforts. Continue Reading

Video

Creating a 'culture of security' requires new look at business priorities

Many organizations strive to make creating a "culture of security" a priority, but doing so requires business leaders to reexamine the role of data protection in bottom-line success. Continue Reading

Blog Post

Pay attention to the human element in fighting security threats

This blog post details why relationship building and top-down employee support is necessary in information security. Continue Reading

3Mobile security-

Mobile security is in your hands

If you're not focusing security efforts on mobile, think again. The number of mobile devices now outnumbers the number of people in the world, making securing those devices -- through next-gen tools and some forward thinking -- a priority for any organization. In this section, we give you an overview of the emerging and prevailing mobile security threats, and provide tips on how to address these concerns.

Feature

'Promiscuous' users: A growing threat to mobile security

In this Q&A, Gartner analyst Dionisio Zumerle explains how "promiscuous" users -- employees who use their tablets and mobile devices for both official and personal use -- can be a mobile security threat. Zumerle also details the mobile security best practices modern organizations should be adopting. Continue Reading

News

The top three mobile security threats that challenge IT

Mobile security threats, such as malware and file-sharing data leakage, are escalating across the enterprise. IT needs strong best practices to mitigate these threats. Continue Reading

4Cloud security-

Crafting a cloud security strategy

As organizations move more and more data to the cloud, cultivating a cloud security strategy is becoming a top CIO imperative. In this section, learn about factors driving cloud threats, and strategies and best practices for improving your organization's cloud security.

News

Cloud security culture imperative to business success

Cultivating a cloud security culture and enlisting a CISO are vital to organizations in the cloud computing era, a new report shows. Continue Reading

Blog Post

A CIO's three tips for better cloud security

In the age of cloud, doling out general advice for improving security is hard because all organizations are different. But there are some guidelines to follow, according to Brian Lillie, CIO at data center builder Equinix. Continue Reading

Video

Building a robust cloud information security strategy

In this video, vArmour senior vice president and chief cybersecurity strategist Mark Weatherford discusses the biggest threats to corporate cloud information security and offers pointers on securing information in the cloud. Continue Reading

News

Does encrypting data in the cloud guarantee security?

As organizations increasingly move more applications to the cloud, they see encryption as a foolproof way to secure information in the cloud. But encryption doesn't guarantee protection, says Gartner analyst Ramon Krikken. Continue Reading

Blog Post

Cloud security: Custom applications in the cloud pose new threat

Custom applications built outside the purview of IT and deployed in the public cloud are vulnerable to cyberattacks, according to research released by the Cloud Security Alliance. Read how this could impact CIOs. Continue Reading

Feature

University IT departments fight to stay accessible, secure

Now more than ever, university IT departments have the difficult task of maintaining a culture of openness while protecting against growing security threats. Continue Reading

5IoT security-

Security in an increasingly connected world

IoT devices are proliferating at a rapid rate, spiking IoT data security concerns in the process. The more connected we get the more important it becomes to protect the massive amount of data involved. That's why IoT security is becoming a vital part of any organization's IT security roadmap. In this section, we explore the biggest security concerns raised by IoT and offer tips about how to address them.

News

Securing IoT devices remains low priority for developers

MIT cybersecurity expert Stuart Madnick says we're woefully unprepared to protect the proliferating population of IoT-enabled devices. Continue Reading

Feature

Is IoT the next ransomware victim?

In this Q&A, IBM executive security advisor Etay Maor shares insight on the strategies employed by cyberattackers and explains why IoT devices are so vulnerable to ransomware attacks. Continue Reading

News

RSA Conference 2016: IoT will fail if security is not top priority

According to experts at RSA Conference 2016, it's time for organizations to put IoT security first -- or risk the inevitable downfall of the internet of things. Continue Reading

Video

IoT device security triggers new data protection questions

In this video, vArmour CISO Demetrios Lazarikos discusses how companies' efforts to secure IoT devices are influencing their overall infosec strategy. Continue Reading

Video

No precedent when it comes to addressing IoT security challenges

As the internet of things grows, so will accompanying enterprise security challenges. In this webinar, learn how a lack of focus on IoT security challenges during the design stage could create numerous data protection vulnerabilities. Continue Reading

6Security budgets-

Don't spend more; spend right

Investing in security is always a good idea, but throwing money at the problem won't cut it. In this section, find out how to manage your IT security spending efficiently.

News

Security pros: Cybersecurity budgets not keeping pace with rising threats

While there has been a rise in security budgets, spending on security is not on par with the growing threat landscape, according to a study by the Institute of Information Security Professionals. Continue Reading

Video

Cut information security costs with smart personnel, strategy

In this video interview, Jeff Reich, chief security officer at Barricade.io, discusses how embedding data protection efforts in corporate strategy can reduce information security costs. Continue Reading

Tip

Why an unlimited cybersecurity budget isn't good for security

A cybersecurity budget with no restrictions may sound like a dream, but it could actually harm enterprise security, says expert Mike O. Villegas. Continue Reading

7Security and the government-

Cybersecurity legislation and CIOs

Cybersecurity isn't just a business priority anymore. Facing new pressures from today's increasing cyberthreats, the U.S. government is stepping in to assess the IT security landscape and enacting legislation to address some of the top concerns. In this section, find out how the government is responding to increasing IT security concerns, how emerging technologies are influencing the legislative process and how such legislation will impact IT executives.

Feature

Emerging tech influencing infosec regulations

In this Q&A, Monique Ferraro, cyber counsel for Munich Re's U.S. P&C Cyber and Privacy Risk Practice, discusses how drones and IoT are influencing information security regulations and the challenges that lawmakers face when developing these new cybersecurity rules. Continue Reading

News

Evaluating Obama's $19B cybersecurity plan

President Obama unveiled a $19 billion national cybersecurity plan to address the cybersecurity skills shortage and mounting cyberthreats, but questions remain. Continue Reading

News

FBI director: Encryption debate needs to be nuanced and thoughtful

While speaking at a symposium at the University of Texas at Austin, FBI Director James Comey explained why now is the time to engage in conversations about backdoor encryption policies. Continue Reading

Feature

Burgeoning data threats intensify security info sharing debate

The federal government is encouraging cybersecurity info sharing to offset threats to data, but some businesses are worried that the data protection measures might infringe on privacy. Continue Reading

News

Congress assesses blockchain security amid ransomware attacks

Legislators have begun examining cryptocurrencies and blockchain security amid growing instances of cybercrime, such as the ransomware attacks on NYT and BBC. Continue Reading

8Security and analytics-

The devil's in the data

Don't underestimate the importance of data analytics in your IT security strategy. In this section, learn how to best tap into analytics at your organization and what tools can help identify, monitor and ward off threats to data security.

Video

Information security monitoring, analytics for the digital age

The rising number of attacks has led to a big increase in cybersecurity intelligence data that can be analyzed to prevent future incidents. But rapidly advancing technology makes it hard to stay ahead of the curve. Continue Reading

Feature

Data-driven marketing fuels privacy, security concerns

As more organizations collect customer data to drive marketing strategies, it creates numerous data security and privacy concerns. Deborah Berebichez, chief data scientist at Metis, explains what steps organizations should take to offset these risks and how data scientists can help. Continue Reading

Photo Story

Advanced security analytics: Finding the best analytics tool

Next-gen security analytics tools provide proactive and responsive analysis of security events. Nemertes Research CEO Johna Till Johnson explains. Continue Reading

9Glossary-

IT security strategy terms

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

The purpose of information security management is to ensure business continuity and reduce business damage by preventing and minimising the impact of security incidents. ... An Information Security Management System (ISMS) enables information to be shared, whilst ensuring the protection of information and computing assets. Great article. Thanks for sharing.
Cancel

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close