Infosecurity White Papers

  1. #IMCUS Slides - Securing the User: Winning Hearts & Minds to Drive Cyber Secure Behavior

    The complete slide deck from the recent session on securing the user as presented at Infosecurity Magazine Conference in Boston.

  2. #IMCUS Slides: Securing Smart City Technology Adoption: Managing Privacy & Cyber Risk

    The complete slide deck from the recent session on securing smart city technology adoption as presented at Infosecurity Magazine Conference in Boston.

  3. IMCUS Slides: Articulating Risk to Senior Management: Enabling Informed Decision-Making

    The complete slide deck from the recent session on articulating risk to senior management as presented at Infosecurity Magazine Conference in Boston.

  4. #IMCUS Slides: Keeping up with Next-Generation of Cyber Risks: Securing the Connected Car

    The complete slide deck from the recent session on securing the connected car as presented at Infosecurity Magazine Conference in Boston.

  5. #IMCUS Slides: Implementing a Dynamic Security Strategy to Support Business Innovation & Digital Transformation

    The complete slide deck from the recent session on dynamic security strategy as presented at Infosecurity Magazine Conference in Boston.

  6. #IMCUS Slides: Deploying Dynamic User Access Controls

    The complete slide deck from the recent session on the software defined perimeter as presented at Infosecurity Magazine Conference in Boston.

  7. How to Produce a World-Class Threat Intelligence Capability

    Discover the six core competencies that comprise a successful threat intelligence program.

  8. CISSP® Planning Kit

    CISSP Planning Kit: Your Guide to CISSP Certification and Beyond. Studying for the CISSP exam can seem overwhelming, which is why (ISC)2 developed this quick guide. Download this planning kit for a CISSP overview, study tips, preview of how to maintain your certification, and more!

  9. Preparing for the GDPR: DPOs, PIAs, and Data Mapping

    With the General Data Protection Regulation coming online in the European Union by May 2018 — by its own terms affecting organizations worldwide that collect or process EU citizens’ personal data — we have an opportunity to test how ready privacy professionals are for a contemporary and comprehensive privacy regulation that makes obligatory many of the last decade’s “privacy-on-the-ground” practices.

  10. Enterprise Mobile: The New Threat Vector

    Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts

  11. Security Configuration Management for Dummies

    If you're in charge of securing your organization's network, reducing its attack surface, or maintaining and proving compliance with regulations, this book is for you.

  12. Secure Email Messaging in Office 365: Four key considerations

    Organisations worldwide are moving to Microsoft Office 365 for hosted email services, and for good reason.

  13. Understand Your Attacker: A Practical Guide to Identifying TTPs With Threat Intelligence

    Combat threats by understanding your adversaries and the tools, techniques, and processes (TTPs) they're likely to weaponize.

  14. 13 Steps to Meeting the Security Challenges of the New EU GDPR

    Once in force, the European Union General Data Protection Regulation (GDPR) will require every multinational company that offers products or services to European Union residents to adhere to a strict set of data privacy and security measures.

  15. Threat Hunting, Shadow IT and Other Bold New Frontiers

    The company continues to move beyond the vulnerability management realm, enabling threat hunting and ‘shadow IT’ discovery use cases via a mix of its sensor options: agent scanning, passive listening, traditional scanning and log analysis.

  16. 4 Fallacies around Security Breaches to Consider for 2017 Budget

    The Cyber security landscape changes quickly and planning your 2017 investment strategy may be something you are iterating right now.

  17. 5 Signs You Need a Mobile Security Game Plan

    Mobile security is on everyone's to do list, but when do you know it’s time for your enterprise to have a mobile security game plan? Appthority tackles that question in its latest eBook, 5 Signs You Need a Mobile Security Game Plan.

  18. Cyber Security and Packet Capture: Making the Connection

    What makes cyberattacks so tricky is that there isn’t a traditional, physical crime scene where evidence can be collected for investigation.

  19. The Last Security Tool

    In 2014, average costs for data breaches rose (USD 5.9 million, up from to USD 5.4 million), lost business (USD 3.2 million, up from USD 3.03), and lost or stolen records (USD 246 per).

  20. Federal Contractors Face New Cyber Security Standards – Here’s How to Prepare

    Prepare Your Organization Now For Updated Federal Security Standards That May Affect Your Organization’s Federal Contracts

What’s hot on Infosecurity Magazine?