Search Results
-
Report CIOs: Take Four Steps To Integrate Cybersecurity And Privacy Into Your Strategy
Strategy: The Cybersecurity And Privacy Playbook
December 2, 2019 | Paul McKayAs CIO, you must work with the chief information security officer (CISO) and chief privacy officer (CPO) to integrate security and privacy into your overall IT strategy. This report lays out the...
-
Report Drive Growth With Customer Trust And Build Brand Resilience
Advanced Level: Technology Practices For Cybersecurity And Privacy
When customers trust you, they want to do more business with you. They're also willing to share more personal data with you and, often, to pay a premium for your products and services. This report...
-
Report Proactively Protect Customers From Fraud, Cybercrime, And Privacy Abuses
Intermediate Level: Technology Practices For Cybersecurity And Privacy
CIOs and technology leaders in the intermediate phase of the journey to cybersecurity and privacy maturity must ensure that security always travels with the data and should position data security...
-
Report Lay Your Security Tech Foundation
Beginner Level: Technology Practices For Cybersecurity And Privacy
This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to move...
-
Report Predictions 2020: Europe
Europe Will Deliver Regulatory Leadership Amid Uncertainty
In 2020, European firms will grapple with increased volatility on both the economic and geopolitical fronts, and Germany's industrial firms, Digital China, and regulators will capitalize on the...
-
Report Establish The People And Culture Foundation For Cybersecurity And Privacy Excellence
Beginner Level: People Practices For Cybersecurity And Privacy
If you're just starting your journey to cybersecurity and privacy maturity, you're not alone. If CIOs, chief information security officers (CISOs), and chief privacy officers (CPOs) establish...
-
Report Elevate Your Cybersecurity And Privacy People And Culture Practices With Metrics
Intermediate Level: People Practices For Cybersecurity And Privacy
Firms in the intermediate phase of the journey to cybersecurity and privacy maturity begin to measure everything. With the right metrics in place in areas such policy effectiveness and employee...
-
Report Secure Your Customers And Protect Your Brand
Executive Overview: The Cybersecurity And Privacy Playbook
Today, CIOs and CTOs are transforming the foundations of their business with technology. For that transformation to succeed, you must transform your cybersecurity and privacy practices...
-
Report The Future Of Cybersecurity And Privacy: Defeat The Data Economy's Demons
The Vision Report In The Cybersecurity And Privacy Playbook
The combination of data and machines could fuel either techno-optimistic utopia (happier, healthier lives for all) or totalitarian dystopia (corporations and governments using personal data to...
-
Report Top Research For CIOs: Security
Realize The Value That Excellent Security Delivers
March 15, 2019 | Matthew GuariniSecurity no longer lives exclusively in the IT department. Now, thanks to ever-escalating attacks, boards and C-suites have become all too familiar with the risks of breaches, and they demand...
-
Report The Top Trends For Healthcare Providers In 2019
2019 marks a year of transition for healthcare delivery as a bevy of market forces will catalyze change. Providers are under threat from new entrants and disruptors, being pushed to take on more...
-
Report Build The Business Case For Cybersecurity And Privacy
Business Case: The Cybersecurity And Privacy Playbook
February 28, 2019 | Andras Cser, Christopher McCleanWith security and privacy breaches constantly in the news, attaining budget for cybersecurity and privacy functions is not the struggle it once was. However, it's impossible to maintain a...
-
Report The Top Trends For Healthcare Insurers In 2019
In 2019, market consolidation and disruptive new entrants will force health plans to expand their core competencies if they hope to attract new members, reduce medical costs, and drive growth....
-
Report Benchmark Your Cybersecurity And Privacy Maturity, 2019
The Benchmark Report In The Cybersecurity And Privacy Playbook
January 30, 2019 | Christopher McClean, Trevor Lyness, Stephanie BalaourasThis data-driven report examines the maturity of security and privacy programs at companies around the world. It then goes further to examine how and why firms that are mature look different from...
-
Report Optimize Cybersecurity And Privacy Oversight
Advanced Level: Oversight For Cybersecurity And Privacy
Firms with advanced-level oversight for cybersecurity and privacy are rare, but despite their strong efforts, they can't become complacent. Regulatory requirements, threats, business models, and...
-
Report Elevate Cybersecurity And Privacy Oversight
Intermediate Level: Oversight For Cybersecurity And Privacy
Firms with intermediate cybersecurity and privacy oversight have a solid foundation and are seeking to extend their influence in the organization. By strengthening strategy, governance, adherence...
-
Report Establish Your Cybersecurity And Privacy Oversight Foundation
Beginner Level: Oversight For Cybersecurity And Privacy
CIOs and technology leaders just starting to build their cybersecurity and privacy oversight will struggle to keep up with the speed and scope the business expects from their program. In this...
-
Report Build A Strong Process Foundation For Cybersecurity And Privacy
Beginner Level: Process For Cybersecurity And Privacy
January 10, 2019 | Nick Hayes, Claire O'MalleyTo ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and clearly defined processes for critical areas ranging from internal data security...
-
Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success
Advanced Level: Process For Cybersecurity And Privacy
January 10, 2019 | Stephanie BalaourasCIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect the brand, they help their firms drive growth and long-term success. This report — the third of three in the...
-
Report Elevate Cybersecurity And Privacy With Process Metrics
Intermediate Level: Process For Cybersecurity And Privacy
January 10, 2019 | Nick Hayes, Salvatore SchianoThe intermediate phase of the journey to cybersecurity and privacy maturity turns on establishing metrics and collecting data to drive process improvement. This report — the second of three in the...
-
Report Quantum Is Not An Immediate Security Threat
Start Educating Your Team On The Long-Term Security Implications Of Quantum Computing
November 30, 2018 | Brian HopkinsHeadline grabbing statements about the near-term threat of quantum computers to security contain truth that is often disguised by hype. This report separates fact from fiction. CIOs need this...
-
Report Assess Your Cybersecurity And Privacy Maturity
Assessment: The Cybersecurity And Privacy Playbook
Weak cybersecurity and privacy practices reflect poorly on your company's brand, making it less attractive to customers, partners, employees, and investors. CIOs who want to drive business success...