Email Alerts
-
How to align an information security framework to your business model
CISOs should consider blending traditional business models with information security frameworks, and not rely solely on regulations to drive security programs. Tip
-
How to get information security buy-in from the executive team
When pitching security to the big bosses, it's important to brush up on public-speaking skills and lay out the case in advance. Mike Rothman gives his recommendations on how to prepare for a security presentation in order to receive the necessary man... Tip
-
M&A: Merging network security policies
Company mergers often call for the consolidation of two different network policies. But before making any final decisions on technology, the staff members of both organizations need to be on the same page. In this tip, contributor Mike Chapple explai... Tip
-
Mergers and acquisitions: Building up security after an M&A
Mergers and acquisitions are common headlines in today's information security world, and that's great news for malicious hackers and data thieves. When companies join forces, they often leave themselves open to attack. In this tip, contributor Ed Sko... Tip
-
Ensuring Web application security during a company merger
When companies merge, so must their Web application infrastructures. Securing and integrating applications, however, can be a struggle without cooperation from all sides. In this tip, Michael Cobb explains how a merged organization can avoid turf bat... Tip
-
Best practices for compliance during a merger
Company mergers involve more than just aligning two different security infrastructures. When one vendor acquires another, it's the handling of compliance issues that can be an IT security staff's toughest task. In this tip, security expert Joel Dubin... Tip
-
Key elements when building an information security program
Discover how to achieve information security governance by learning the essential elements behind a sucessful security program. Tip
-
A guide to governance, security and safeguarding your business
In this presentation, Dr. Fred Cohen, who is one of the world's leading researchers and analysts in information protection, investigates the link between corporate governance and information protection. Tip
-
Management support: The key to baking security into business processes
If you still haven't garnered the support you need from management to build security into business processes, perhaps it's time to try a different approach. Tip
-
Weekly Security Planner: December
Objectives prescribed for weeks 48-52. Tip
Security Management Strategies for the CIO