An IT Manager's Guide to a Successful Audit
This paper provides an overview of the audit process and how IT management can insert themselves into this process to benefit from the exercise.
An IT Director's Guide to Communicating Security Needs with the Executive Team
This paper discusses effective ways to communicate security concerns and solutions to the executive team – providing talking points and suggestions.
Top Tips for Developing Effective Security Awareness and Training Programs
This paper delivers proven tips for developing an effective security awareness and training program.
Enhancing Information Security in an Unsecure World
This paper reviews four areas of concern: Passwords, Network Considerations, Data Security and Social Engineering. Each section (except social engineering) is made up of three levels: Basic, Moderate and Advanced. Each level progressively guides how to improve security practices.
First Steps in Compliance Initiatives | Risk Assessments and Policies
Compliance is not a technology problem, it is a business problem. So many times we look to technology to solve all of our problems, but the real solution comes from our policies, procedures and documentation. Download this Paper to get 6 Helpful Tips for Improving Your Policy Writing Process.
Understanding SIEM Options | Time. Money. Resources. - A comparison between MSSP and On-premise SIEM
Deciding between a managed security services provider (MSSP) and on-premise SIEM solution can be daunting, but gaining a basic understanding of the differences will help your organization establish its best approach to security monitoring.