THE CISO VIEW

来自业界领先的ciso的独立点对点指导.

ABOUT THE CISO VIEW RESEARCH SERIES

CISO View报告系列是与独立研究公司Robinson Insight联合开发的,汇集了领先的CISO的点对点信息共享,以帮助安全团队建立有效的网络安全计划.

2021 CISO VIEW - Zero Trust

在转换为零信任时保护特权访问

Newly Available

数字化转型和企业移动性正在迅速侵蚀传统的基于周界的模式. As the perimeter dissolves, 组织如何保护对其最有价值的资源——数据的访问, applications, and infrastructure – on-premises or in the cloud?

正规博十大app排名就不断变化的风险状况采访了12名全球1000名ciso, 包括针对特权访问的不断发展的攻击技术. 他们提出了具体的建议,以减少风险使用零信任模型. 这份报告是第一个为ciso及其团队实施零信任模型提供实践和操作见解的报告之一.

A companion to this report is The CISO View 2021 Survey: Zero Trust and Privileged Access. After hearing from our panel, 正规博十大app排名想知道更大的安全团体是否认同他们的观点. Therefore, 正规博十大app排名调查了100名来自大企业(年收入超过10亿美元)的安全主管, about their perspectives. 受访者和调查小组都表示,人们对“零信任”(Zero Trust)的价值达成了广泛共识,对确保特权访问权的紧迫感也日益增强.

MORE FROM THE SERIES

PROTECTING PRIVILEGED ACCESS IN ROBOTIC PROCESS AUTOMATION

Securing RPA Workflows

机器人过程自动化(RPA)是提高效率、生产力和质量的快速途径. From a cyber security perspective, 随着特权访问的扩散,RPA也带来了一个新的和有吸引力的攻击表面.

这份CISO View研究报告研究了如下问题:攻击者可能使用哪些技术来利用RPA系统中的特权访问? What are the most significant risks? What controls are the most useful and feasible? 与业务利益相关者合作的关键成功因素是什么?

PROTECTING PRIVILEGED ACCESS

Securing Devops and Cloud Environments

快速软件开发和自动化IT操作的回报是显而易见的——更快的上市时间和降低的成本. But, what about the risks? 如何成功保护DevOps和云环境?

这份CISO View研究报告借鉴了全球1000强中CISO的经验, 以及适应和保护DevOps环境的安全专业人员和技术专家.

RAPID RISK REDUCTION

A 30-Day Sprint to Protect Privileged Credentials

How do you avoid a data breach? 最终,您需要知道攻击者使用什么技术以及可以阻止他们的安全控制. 这份CISO View的研究报告提供了从几起备受关注的数据泄露事件中吸取的教训, 以及建议和30天冲刺框架,以指导关键控制的快速实施.

THE BALANCING ACT

The CISO View on Improving Privileged Access Controls

本报告为ciso提供了实际指导,以领导组织的第一手知识为基础,改进特权访问控制. 该指南包括在允许和限制高层访问信息资产之间建立平衡的建议.

ABOUT THE CISO VIEW RESEARCH APPROACH AND PANEL

今天,组织面临着日益复杂和具有挑战性的网络威胁. At CyberArk, 正规博十大app排名相信,在CISO社区之间分享见解和指导将有助于加强安全战略,并使组织得到更好的保护.

CyberArk has commissioned an independent research firm, Robinson Insight, 开发《正规博十大app排名》,探索与改进特权访问控制相关的主题. 该倡议汇集了来自全球领先组织的ciso,分享他们对安全领导者面临的关键问题的见解,目的是建立有价值的对等指导和对话. Contributors to current and past reports, CISO视图研究小组成员包括以下人员.

Alissa (Dr Jay) Abdullah

SVP and Deputy Chief Security Officer, Mastercard

Brad Arkin

SVP, Chief Security & Trust Officer, Cisco

Tim Bengson

凯洛格公司副总裁,全球首席信息安全官

Dawn Cappelli

罗克韦尔自动化副总裁,全球安全和首席信息安全官

Melissa Carvalho

VP, Enterprise and Customer Identity and Access Management,
Royal Bank of Canada (RBC)

Dave Estlick

Chief Information Security Officer, Chipotle

Peter Fizelle

Chief Information Security Officer, Asian Development Bank

Mike Gordon

洛克希德·马丁公司副总裁兼首席信息安全官

Omar Khawaja

VP and Chief Information Security Officer, Highmark Health

Olivier Perrault

Cyber Security Officer, Orange Business Services

Emma Smith

Global Security Director, Vodafone

Daniel Tse

Head, Cyber Security, Information & Technology Risk, GIC Private Limited

之前报告的贡献者包括以下人员

Rob Bening

Chief Information Security Officer Emeritus, ING Bank

David Bruyea

Senior Vice President & Chief Information Security Officer, CIBC

Jim Connelly

Vice President & Chief Information Security Officer, Lockheed Martin

Khadir Fayaz

Vice President, Global Security Strategy, Engineering & Architecture, Pearson

John Gelinne

Managing Director, Advisory Cyber Risk Services, Deloitte & Touche

Fred Gibbins

Senior Vice President & 美国运通公司首席信息安全官

Charles Gillman

首席安全官,NTT通信-云基础设施服务

Steve Glynn

Global Head of Information Security, ANZ

Mark Grant

博士,CIPP首席信息安全官,CSX公司

Gary Harbison

Chief Information Security Officer, Monsanto Company

Jim Motes

Vice President & Chief Information Security Officer, Rockwell Automation

Kathy Orner

Chief Risk Officer, CWT

JD Rogers

美国金融集团首席信息安全官

John Schramm

CISA, CISSP, VP Global Information Risk Management & CIRO, Manulife

Chun Meng Tee

新加坡交易所副总裁兼信息安全主管

Thomas Tschersich

Senior Vice President, Internal Security & Cyber Defense, T-Systems International

Munawar Valiji

Head of Information Security, News UK

Mike Wilson

Vice President & Chief Information Security Officer, McKesson

*Represents role at time of contribution.

GET STARTED

利用业内最具创新的ciso的专业知识,帮助您构建一个有效的网络安全计划.

友情链接: 1 2 3 4 5 6 7 8 9 10