Special Report: IT security's looming tipping point

Download our report: IT Security's Looming Tipping Point

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.
csuitersch cover

Given the rash of high-profile data breaches that have exposed customers' personal information, created PR nightmares and cost C-level executives their jobs, IT and business leaders should have security at the top of their priority list. But while businesses are saying the right things about giving IT security more attention and budget, is that talk being put into useful action?

To find out, the editors of CIO, Computerworld and CSO joined forces to survey IT and business leaders about the state of information security. In this C-Suite 360 special report you'll find key results from the survey as well as guidance on a range of issues faced by organizations looking to ramp up their security game, from aligning security needs with business goals to crafting an infosec model that stays on top of new threats without overwhelming users.

Register to download this report!

What's inside:

Navigating the Muddy Waters of Enterprise Infosec

Information security finally has the attention of upper management, but aligning IT's concerns with business needs is still challenging.

Security Challenge: Wearing Multiple Hats in IT

Handling both security and IT duties means a daily balancing act for the resource-constrained IT organizations that must take this approach. But along with the challenges, there can also be benefits.

How Flexible Should Your Infosec Model Be?

Organizations need to stay on top of a fast-shifting threat landscape by updating their security policies — without badgering users into a state of noncompliance.

Why (and When) Outsourcing Security Makes Sense

Offloading security strategy and day-to-day operations to a managed security service provider can free up IT resources. But be prepared: It's not an entirely hands-off proposition.

To continue reading this article register now

Join the discussion
Be the first to comment on this article. Our Commenting Policies