Enterprise risk management News
March 24, 2016
The information security chief needs to discern the right technology -- and lay down policy. So what skills are required for the CISO job?
December 18, 2015
The EU has agreed upon a radical set of data protection rules. What does it mean for U.S. IT execs? Also in Searchlight: Apple has a new COO; Republican candidates fumble on tech knowledge.
December 11, 2015
U.S. calls on tech giants to combat terrorist threats online. Also in SearchLight: Yahoo to split; Bitcoin founder, found and lost; Zuckerberg under fire for giving away billions.
October 09, 2015
Can IBM bring cognitive computing to the masses? That's the mission for IBM's new Cognitive Business Solutions group. Also in Searchlight: Apple breaks up with VMware; Dell might buy EMC.
Enterprise risk management Get Started
Bring yourself up to speed with our introductory content
In the first part of this webcast, Nemertes Research CEO Johna Till Johnson encourages CIOs not to ignore new, sophisticated threats and to plan for next-generation security. Continue Reading
Learn how the perimeter-based architecture failure, a professional threat economy and greater hacking penalties are driving the need for a next-generation security architecture. Continue Reading
Niel Nickolaisen suggests fellow IT leaders ignore the hysteria over 'mobile-first' enterprises and take a balanced approach to mobile app development. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Enterprise risk management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In this photo story, Nemertes Research CEO Johna Till Johnson reviews six enterprise security architecture technologies CIOs should consider when developing an IT security roadmap. Continue Reading
Two weeks into a new CIO job at a global bank, Harvey Koeppel was faced with a cybersecurity threat halfway across the globe. Keeping a level head made all the difference. Continue Reading
The longstanding question of whom CISOs should report to has taken on new urgency as digital security rises to the top of corporate agendas. Continue Reading
Manage Enterprise risk management
Learn to apply best practices and optimize your operations.
When managing your organization's risk assessment procedure, the right planning and data handling can make all the difference in crafting a business continuity strategy. Continue Reading
In part three of this webcast series with Nemertes Research CEO Johna Till Johnson, learn about the technologies needed for a next-generation security architecture. Continue Reading
In this SearchCIO webcast, Nemertes Research CEO Johna Till Johnson explains how CIOs should build a functional IT security roadmap. Continue Reading
Problem Solve Enterprise risk management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
According to one statistic, as of July 2015 there were, in total, almost 4 million applications available on the app stores of Amazon, Apple, BlackBerry, Google and Windows. This figure is only one reflection of how the technologies that enable our ... Continue Reading
When your organization plans out how to handle a data breach, managing public perception should be given special consideration. One piece of advice: Don't play the victim. Continue Reading
Due to the demand for professionals with backgrounds in both computer science and networking, filling cybersecurity jobs is difficult. Technology will have to play a bigger role. Continue Reading