White Papers

Featured White Papers



Translating Security Leadership into Board Value
By RSA | 12/5/2017

What Boards Want to Know and CISOs Need to Say

Seven years ago in the SBIC report Bridging the CISO-CEO Divide, we explored the best practices security leaders could use to communicate more effectively with their C􀀁Os. CISOs were at a crossroads and just beginning to take a seat at the executive table. We provided recommendations from global leaders about ways CISOs could embrace their growing leadership role, build trust with the executive leadership team and earn the confidence of their C􀀁O. We discussed how harting a new course based on a strategic, risk-based approach to information security would drive clear business value.

Download this now


Vulnerability and threat intelligence feed for accurate prioritisation and fast migration
By Skybox Security | 10/7/2017

To deploy resources in the right place, in the right way, vulnerability management teams need to know the intersection of vulnerabilities, network context and the threat landscape.

Download this now


CSO Security Buyers Guide 2017
By CSO | 11/8/2017

The pressure is on to be secure. Are you feeling the squeeze?

If you spent the past few years coming to grips with the true extent of the threat from malware, ransomware and nation-state hackers, be prepared for the rest of 2017 to play out rather differently. Sure, the threats are still there and growing but as Australia prepares to join the ranks of the nations with mandatory breach reporting regimes, you are now operating under the microscope and on a deadline.

Download this now


ENTERPRISES RE-ENGINEER SECURITY IN THE AGE OF DIGITAL TRANSFORMATION
By BMC Australia | 26/7/2017

It’s no secret that CEOs across North America and Europe have been marshal-ing forces for digital transformation in a high-stakes battle to ward off ambitious insurgents, maintain market share and address the changing demands of today’s customers. This is a once-in-a-generation challenge for any business leader, but it’s not the whole story. Behind the scenes, a fourth imperative is being added to the list of transformation considerations—combating modern cybercriminals.

Download this now


Using security metrics to drive action in ASIA Pacific
By Tenable Network Security | 8/5/2017

22 Experts Share How to Communicate Security Program Effectiveness to Upper Management.

Today’s cybersecurity challenges are more complex than ever before. Technologies like Development Containers, Cloud, BYOD, and BYOA have greatly complicated the security team’s ability to understand all of the potential IT attack surface.

We hope you find this e-book useful in helping you develop and communicate security metrics in your own organization.

Download this now
[]