Remove Download Remove Information Security Remove Security
article thumbnail

What it takes to become a chief information security officer (CISO)

Network World

Career Tracker: What it takes to be a chief information security officer. Jeff Foltz did not set out to be an information security professional. He arrived at his current role as CISO at Fidelity National Financial by making the most of a series of opportunities and constantly building his skillset.

article thumbnail

New Video: Automating Your Cyber Defenses Including Malware Removal

CTOvision

It highlights ten requirements CTOs, CIOs, CISOs and CFOs should articulate as critical to success in automating security response. Additional context into this topic is available in our research report downloadable here: . This paper.

Malware 276
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Video Shows What To Do When Your Cyber Adversaries Are Automating

CTOvision

It highlights ten requirements CTOs, CIOs, CISOs and CFOs should articulate as critical to success in automating security response. Additional context into this topic is available in our research report downloadable here: . The bottom line of this research: Your online adversaries are automating. This paper.

Video 258
article thumbnail

An Interview with IO's CISO, Bob Butler, on Logical and Physical.

CTOvision

Podcast: Play in new window | Download. In this podcast I interviewed Bob Butler, Chief Information Security Officer at IO. IO is the leading provider of next-generation modular data center technology and services designs,'

article thumbnail

Our Views On Automating Cyber Defense Including Malware Removal and Return to a Known Good State

CTOvision

With changes in technology, enterprise cyber security professionals can now leverage automated in-line response and recovery to enhance security. Download “Automating Removal Of Advanced Threats” Automating-Removal-of-Malware.pdf – Downloaded 468 times – 918 kB. This paper.

Malware 253
article thumbnail

Download the security information and event management (SIEM) tools buyer’s guide

Network World

From the editors of our sister publication CSO, this enterprise buyers guide helps network security staff understand what SIEM can do for their organizations and how to choose the right solution.

Security 195
article thumbnail

Security challenge: Wearing multiple hats in IT

Network World

Are you taking on multiple job responsibilities at your company, including some aspects of information security? At many organizations, IT professionals are being asked to handle a variety of security tasks and functions. Download the State of Information Security research report ]. If so, you’re not alone.

Security 150