Sponsor: RSA Security

Translating Security Leadership into Board Value

Today’s CISOs are an active and valued part of the senior management team. They hold increasing responsibilities across the enterprise, including regularly reporting not only to their fellow leaders, but also directly to the board on cybersecurity issues. The time is right to explore how CISOs can best communicate with their boards and how CISOs and board members can work together to position their organizations to better mitigate, and prevent, increasing information security risks.

Get Whitepaper

Business-Driven Security And The GDPR

The EU’s General Data Protection Regulation (GDPR) will affect any company that does business within the EU and goes into effect on May 25, 2018. The GDPR represents a major evolution in global data security and privacy practices, so companies will need to thoroughly review, and in many cases drastically change, the way personal data is handled going forward.

  • Data protection mandates in the GDPR
  • Data privacy vs. Data Protection
  • Threat prevention vs. Threat Detection and Response
  • The advantage of Business-Driven Security™ solutions like RSA NetWitness Suite to raise your security effectiveness
Get Whitepaper

KingSlayer – A Supply Chain Attack

RSA Research investigated the source of suspsicious, observed beaconing thought to be associated with targeted malware. In the course of this tactical hunt for unidentified code, RSA discovered a sophisticated attack on a software supply-chain involving a Trojan inserted in otherwise legitimate software; software that is used typically used by enterprise system administrators. Get details of this attack as well as mitigation and detection strategies.
Get Whitepaper

Forrester Wave Security Analytics

The Forrester Wave™: Security Analytics Platforms, Q1 2017. In their 36-criteria evaluation of security analytics (SA) providers, Forrester identified the 11 most significant ones and researched, analyzed, and scored them. Download this report to see why RSA was named a Leader and how SA solutions enable security and risk professionals to detect, investigate and respond to cybersecurity threats.
Get Whitepaper

Closing the Skills Gap

35% of the open positions in cybersecurity can’t be filled today because there are not enough skilled candidates. There are too many threats, hiding amid too much data, leading to overworked analysts unable to focus on what matters most. Automated analytics can empower your existing security analysts to work more effectively on more complex tasks -- essentially closing the skills gap. Find out how.
Get Whitepaper

IDC Report: Modern Defense Against Sophisticated Attacks Requires Comprehensive Endpoint Protection

Read this IDC Technology Spotlight to explore the key capabilities of modern endpoint security technologies in the market. See why enterprises are choosing solutions containing more sophisticated detection and deeper forensics capabilities to enable incident responders to execute faster triage and investigations. Access this in-depth analyst report for insights on responding to endpoint threats in minutes.
Get Whitepaper

Achieving High Fidelity Security: An EMA White Paper

Discover the key facets of high-fidelity security – the ability for organizations to collect comprehensive and timely data and gain context for fast and prioritized threat detection and response. Learn about the benefits of combining network and endpoint data with a strong analytic toolset. Read this analyst report for more details about a successful security monitoring program and insights for making your security team more effective.
Get Whitepaper