Does it matter who the CISO reports to?

Email not displaying correctly? View it in your browser.

IDG’s Top Enterprise Stories

Our top picks from IDG's editors
Jun 12, 2018
IDG
Featured Image
INSIDER

The pros and cons of outsourcing data analytics

Organizations are increasingly tapping service providers to glean insights from their data. Here are the benefits and risks of analytics outsourcing. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Does it matter who the CISO reports to?
Introducing SPFx, the SharePoint Framework for business apps
How the Spanish cybercriminal underground operates
Martech spending in 2018: What CIOs need to know
How to get the most cloud security
End-to-end data, analytics key to solving application performance problems
Why you need centralized logging and event log management

Case Study: Spectrum Enterprise

Nonstop Digital Connectivity Fires Up Fans and Revenue

H&S's performance is measured by attendance, big-name bookings and how much fans spend on merchandise and concessions. Digital innovation plays a crucial role in creating a thrilling live experience that raises fans' satisfaction and their average "spend." Read More

Thumbnail Image
INSIDER

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read More

Thumbnail Image
INSIDER

Introducing SPFx, the SharePoint Framework for business apps

Microsoft’s open source web tool is changing how you build business applications on top of SharePoint Read More

Thumbnail Image
Video

How the Spanish cybercriminal underground operates

Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks. Watch Now

Thumbnail Image

Martech spending in 2018: What CIOs need to know

From CRM and business intelligence to chatbots and automation, marketers have spending plans across the marketing tech stack. Read More

Thumbnail Image

How to get the most cloud security

User education is more effective than the best security technology alone Read More

Thumbnail Image

End-to-end data, analytics key to solving application performance problems

Nyansa adds WAN and client insight to Voyance to provide greater visibility into user experience and application performance. Read More

Thumbnail Image

Why you need centralized logging and event log management

Collecting too much log data overwhelms systems and staff. Centralized event log management lets you filter for the most significant security data. Read More

White Paper: Webroot Software

Why Efficacy is Paramount

Malware detection itself is not the only factor to consider when choosing an endpoint security solution. In addition to initial detection, comprehensive endpoint security must a number of things. Read more to find out. Read More

Get more from the experts at these enterprise websites from IDG:

CIO | Computerworld | CSO | InfoWorld | Network World

You are currently subscribed to IDG’s Top Enterprise Stories as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Privacy Policy

Learn more about INSIDER

Copyright © 2018 IDG Communications, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.