5 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Jeff Pollard
  • Network Security

Search Results

  • Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Zero Trust Security Playbook
    September 25, 2019 | Chase Cunningham, David Holmes, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...

  • Forum Security & Risk 2019

    A New Hope
    September 12, 2019 | Washington, D.C. | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    Privacy is the new competitive advantage. Your customers increasingly gravitate to brands they trust. How do you weave trust into the core of your brand promise and value proposition? How can you...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report Zero Trust Outside The Wire: Combatting Cyber Influence And Espionage Threats

    Computational Propaganda, Fake News, And Viral Videos Represent A New Type Of Business Attack With Devastating Consequences
    September 25, 2018 | Chase Cunningham, Nick Hayes, Jeff Pollard

    Direct cyberattacks that take a bank offline or steal millions of customer records are alarming, but there's an even larger, more dangerous specter of attacks security leaders are unprepared to...

  • Report The Rise Of The Cybersecurity And Privacy Lobby

    Take The Lead On These Five Policy Issues That Will Shape The Future Of Security
    March 12, 2018 | Jeff Pollard, Claire O'Malley

    Cybersecurity and privacy issues currently dominate tech public policy debate. Lobbyists, politicians, and academia are shaping the legal frameworks and regulatory requirements with which CISOs...

Content Type

Apply

Filters

Region

Market Imperatives