You've requested...

Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee

If a new window did not open, click here to view this asset.

Download this next:

Phishing test strategies to train your employees

Phishing emails pose a significant threat, even to vigilant employees. This blog post guides you on testing employees with phishing emails to find vulnerabilities and offer targeted training. Key topics include:

  • Benefits of phishing email tests, like exposing employees to real-world tactics and identifying at-risk individuals
  • 7 common phishing attack types employees should recognize, such as classic phishing and spear phishing
  • Best practices for a comprehensive phishing testing program, including selecting the right partner and solution

Equip your employees to defend against sophisticated phishing threats. Read the full blog post to begin.

These are also closely related to: "Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee"

  • CISSP Exam Guide: Chapter 1: Security and Risk Management

    In this chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

    Inside, discover 174 pages that dive into:

    • Security terminology and principles
    • Protection control types
    • Security frameworks, models, standards, and best practices
    • Computer laws and crimes
    • Intellectual property
    • Data breaches
    • Risk management
    • Threat modeling
    • Business continuity and disaster recovery
    • Personnel security
    • Security governance

  • IT Budgeting for Cyber Resilience: 2025 Trends and Predictions

    Enterprise Strategy Group’s (ESG) latest Technology Spending Study discovered that almost half (46%) of organizations are increasing their budgets this year—a finding that experts from Corsica Technologies affirms.

    In this vein, 65% of IT buyers surveyed by ESG confirmed they’re increasing cybersecurity budgets to stave off next-level phishing and whaling attempts, new ransomware strains, and cloud-based threats.

    Join this Tech Talk discussion with Corsica’s CEO Brian Harmison and COO Peter Rodenhauser to uncover significant cyber resilience budgeting trends to keep in mind this year. Here’s a quick teaser: security awareness training and cyber insurance are among the topics covered.

Find more content like what you just read:

  • Why many local government CISOs struggle to get board support

    Local government CISOs face a credibility gap, with 67% pressured to downplay cyber risks. Despite rising attacks, many boards dismiss security concerns or see cybersecurity as just an IT issue. Building resilience requires clear communication and unified platforms. Read this report to learn how CISOs can gain board trust and secure resources

    Download

  • Building trust in the age of digital

    An often-overlooked consequence of digital transformation is the lack of human-to-human interaction and its effect on trust. In this video, Computer Weekly ‘s Bryan Glick sits down with Cygenta CEO Jessica Barker to discuss digital trust, exploring what steps you can take to build trust with customers. Watch now to learn more.

    Download

  • Do you need unified or diversified cybersecurity software?

    In this 10-page e-book, unlock a guide to choosing between unified and diversified cybersecurity software.

    Download

  • How to address the cybersecurity skills gap in 2024

    The cybersecurity skills gap is widening due to increasing threats and lack of qualified professionals. Learn how to bridge this gap through education, training, and staff augmentation strategies. Read the full article to discover how you can upskill your security team.

    Download

  • Weighing the risks and benefits of security platform strategies

    Explore the risks and benefits of a single security platform versus integrated best-of-breed solutions. Learn how to make informed decisions for your organization's security needs. Read the full article to understand the recommendations for security teams.

    Download

  • Cybersecurity self-assessment quiz: Discover where your organization stands

    Assess your organization's cyber preparedness with a free quiz on key security elements like risk assessments, mobile device management, employee training, network monitoring, detection software, and stakeholder reporting. Identify your defenses and potential vulnerabilities. Take this self-assessment quiz for personalized cybersecurity results.

    Download

  • Secure your organization during leadership transitions

    This white paper examines cybersecurity challenges during political transitions, offering strategies for risk mitigation, access control, and data protection. Key recommendations include creating transition plans, restricting sensitive data access, and enforcing data segmentation. Read the full paper for guidance on managing cybersecurity.

    Download

  • Bitcoin, App Security, and Oracle's Controversial Licensing Policies

    Discover how blockchain, the tech behind bitcoin, is extending its reach beyond financial services into new industries. Also learn from developers about the pros and cons of componentizing application software, examine what a recent court case shows about Oracle's licensing policies, and more.

    Download

  • Cybersecurity ROSI Calculator

    Estimate your return on security investment (ROSI) for cybersecurity services with this free, interactive calculator. Learn how to make strategic decisions about protecting your business with this valuable resource.

    Download

  • The human element in security: People as a vital contributor

    Traditional security training focuses on compliance, not behavioral change, creating a gap in defenses. This eBook explores why many employees bypass protocols and offers strategies to transform awareness into action through personalized education, real-time nudges, and metrics. Build a sustainable security culture that empowers employees.

    Download

  • 154-pg e-book: A guide to activating your cyber defense

    By reading this e-book, you will understand how to activate your cyber defense with an intelligence-led approach. Read on now to learn how you can leverage threat intelligence, detection engineering, and coordinated incident response to maximize your Defender's Advantage and strengthen your cybersecurity posture.

    Download

  • 2021 Capgemini Cyber Resilience Study

    Forrester's survey of IT/security decision-makers, commissioned by Capgemini, found that business leaders are adapting to and planning for change through smart investments. Specifically, 66% plan to invest in cyber resiliency this year. Uncover more key findings in this report.

    Download

  • Security at Scale: What It Means and Its Challenges

    In this webcast, Plixer’s VP of Field Operations joins Endace’s Michael Morris for a discussion about security strategies. Watch now to learn about the challenges of security at scale and to understand where many organizations are falling short in their security postures.

    Download

  • Dell’s 3 Pillars of Modern Security

    Review this white paper to discover the 3 pillars of Dell’s holistic approach to modern security.

    Download

  • Cybersecurity Guide: Fortifying Business in the Digital Age

    Discover how FCN and Dell Technologies collaborate to fortify businesses against evolving cyber threats. This comprehensive guide explores innovative cybersecurity solutions, from network security to cloud services, empowering secure digital transformation. Read the full e-book to strengthen your organization's security posture.

    Download

  • Empowering Cybersecurity Resilience: Comprehensive Solutions for Modern Threats

    To ensure strong security in the evolving cyberthreat landscape, your organization must prioritize cyber resilience. Here to help you do so is this 10-page eBook, "Empowering Cybersecurity Resilience: Comprehensive Solutions for Modern Threats." Tap into the book to learn about the pillars of cyber resilience, best practices and more.

    Download

  • Healthcare security: Mission critical

    Read this case study to learn how ARG helped AbsoluteCare, a leading healthcare provider for vulnerable populations, find the best match for their infrastructure and security needs.

    Download

  • Boardroom Breakdown: How NHS CISOs Can Leap the Credibility Gap

    NHS CISOs face challenges with cybersecurity amid digital transformation, budget constraints, and a complex attack surface. Research shows 74% of healthcare CISOs feel boardroom pressure to downplay cyber risks. Read this report to learn how communication can bridge the gap and improve NHS cyber-resilience.

    Download

  • OT cybersecurity: Threats & readiness strategies

    In this webcast, Endace’s Michael Morris interviews Fortinet’s CISO of Operational Technology (OT). Their conversation covers the advancing cyberattacks that threaten OT, why cybercriminals target OT environments, and much more.

    Download

  • Cybersecurity megatrends and their impact on protection strategies

    Discover how cybersecurity megatrends impact your organization and the evolving threat landscape. Learn how to secure remote access, build user trust, and choose the right protection - EPP, EDR, or XDR. Download this e-book to learn more.

    Download

  • IT SecOps in the age of remote work

    Enterprise IT teams are adapting to a new IT landscape with a workforce mostly or entirely remote indefinitely. The inside-out enterprise: redefining IT SecOps for today’s remote-first workplace explores three security risk management challenges related to managing clients and what organizations can do to overcome them.

    Download

  • Hardware Security Modules (HSM) get a visibility upgrade

    Utimaco, a leading provider of Hardware Security Modules (HSMs), has partnered with Infosec Global in order to enhance the visibility of HSM keys across the digital ecosystem. This webinar provides insights into this strategic partnership and the value it offers for your business.

    Download

  • Solving the 3 Most Impactful AD and Entra ID Group Management Challenges

    This white paper explores the top 3 challenges of managing Active Directory and Entra ID groups. Learn how to implement a group management lifecycle to improve security and mitigate these risks. Read the full white paper to learn more.

    Download

  • Frost Radar MDR 2024

    Effective security management is more crucial than ever. But how do you navigate the complex cybersecurity landscape, especially with a persistent shortage of skilled personnel in the field? Download this report to discover why LevelBlue is named a leader in the Frost Radar: Global MDR Market 2024.

    Download

  • 5 Security Concerns for CISOs and How to Address Them

    This white paper explores 5 key security concerns for CISOs, including supply chain attacks, cloud security, and overloaded security teams. Get expert guidance on how to address these issues and prepare your organization for evolving cyberthreats. Read the full white paper to learn more.

    Download

  • Accounting for the variables of modern security

    Digital transformation has introduced numberless variables into the security equation, rendering it much more complex. In this Hughes Network Tech Talk webinar, Michael Ferguson, quantifies the cyber threats facing a typical enterprise in the first hour of each day. Watch now to learn more.

    Download

  • Insights on CISO perspectives for the future of cybersecurity

    CISOs are concerned about security breaches and their job security, as they balance security with employee experience. Many are implementing Passwordless Authentication to improve access control, but face challenges like employee resistance. Download the full report to explore CISO perspectives on Zero Trust, MFA, regulations, and cyber insurance.

    Download

  • Why single-vendor security portfolios may compromise your defenses

    Single-vendor security portfolios may promise savings but can compromise effectiveness. These solutions often have weak SIEM capabilities, poor third-party compatibility, and create single points of failure. A best-of-breed approach offers stronger security and ROI. Learn why CISOs should prioritize effectiveness over vendor consolidation.

    Download

  • The government & security resiliency: Webcast

    In discussion with Endace’s Michael Morris, Cisco Systems’ Senior National Security and Government Strategist provides his thoughts on cybersecurity standards and the risks in today’s landscape. The two consider how government agencies could promote bolstered security resiliency. Watch now to unlock their conversation in full.

    Download

  • Meeting evolving cybersecurity standards

    In his conversation with Endace’s Michael Morris, NIST Fellow Ron Ross shares his thoughts on how cybersecurity standards are evolving with modern threat challenges. Watch now to access his insights.

    Download

  • Security orchestration 101: What is it?

    Security refers to the integration of security tools, unifying intelligence and automating tasks, resulting is a more effective security operations center that better detects and responds to threats. Dive into this e-book to start your security orchestration journey today.

    Download

  • Active Directory Certificate Services 101

    This 143-page e-book aims to be as comprehensive of a reference as possible on the potential attacks against Active Directory Certificate Services, as well as defensive guidance on how to prevent and detect these types of abuses. Download it now to gain key information on how to proactively prevent, detect, and respond to modern threats.

    Download

  • The False Promises of Single-Vendor Security Portfolios: A Primer

    Single-vendor security portfolios may promise savings but can compromise effectiveness. These solutions often have weak SIEM capabilities, poor third-party compatibility, and create single points of failure. A best-of-breed approach offers stronger security and ROI. Learn why CISOs should prioritize effectiveness over vendor consolidation.

    Download

  • Many cybersecurity leaders feel pressured to downplay risks

    Trend Research found that 79% of cybersecurity leaders feel boardroom pressure to downplay risks. In this infographic, six tips are provided to bridge this gap and align security with business value. Review the infographic to elevate your security voice.

    Download

  • CISOs and boards speak different languages: Bridging the gap

    A global study shows 79% of cybersecurity leaders face boardroom pressure to downplay cyber risks, creating a credibility gap that hinders resilience. Read this report to learn how CISOs can bridge this gap and align security with business goals.

    Download

  • The confluence of safety and security in critical systems

    During this webcast, you’ll discover how safety-critical embedded systems design teams and operations teams must begin designing from the ground up with safety and security top-of-mind. Tune in now to find out how you can mitigate risks and ensure the overall integrity and trustworthiness of your systems.

    Download

  • Silicon Angle/theCUBE Interview & Article: Partnerships for Smarter Security

    Dave Vellante, chief analyst at theCUBE Research, talked to JR Balaji, director of product management for security and manageability at Dell Technologies, and Patrick Bohart, director of marketing at Intel, as a part of the Partnerships for Smarter Security event. They discussed the companies' collaboration on strengthening supply chain security.

    Download