TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Former US CTO Megan Smith Talks Tech Transformation & Innovation

by AllAnalyticsSep 19, 2017

How do you transform and prepare a big organization to be ready for opportunity and success? Many companies are facing that challenge right now as they prepare to compete in a new era of analytics-driven business. And who knows better about a job like that than the CTO of the US. Megan Smith is the third Chief Technology Officer (CTO) of the US, and left the role this year. She joined a special edition of AllAnalytics to share her experiences transforming a large organization and more.

  • AllAnalytics
  • Executive Insights & Innovation
  • IT Strategy
  • Strategic CIO
  • IT Leadership
  • Details

Evolution of the Data Scientist Role

by AllAnalyticsSep 19, 2017

In the years since data scientist was declared the sexiest job, the role itself has evolved. As happens with any job, hiring managers have been adjusting their expectations for data science candidates, and executives are defining the role of the data scientist in ways that meet the needs of their organizations.

Many organizations have abandoned the "unicorn" concept, which imposed so many technical and business requirements on the "ideal candidate" that said candidate could have been

  • AllAnalytics
  • Team Building & Staffing
  • Digital Business
  • Details

GDPR: What Executives and Board Members Need to Know

by CyberArkSep 15, 2017

The intent of the EU Council's General Data Protection Regulation (GDPR) is to better address the protection of personal data, and because individuals may have the right to receive compensation from the controller in situations related to non-compliance, you'll want to be sure to pass along this one-page primer to executive management.

  • CyberArk
  • Risk Management/Security
  • Database Security
  • Details

How to Get Ready for the Next Wave of Advanced Analytics: AI and Machine Learning

by AllAnalyticsSep 15, 2017

Artificial intelligence and machine learning have hit the mainstream, spanning consumer devices to enterprise initiatives. Experts in the field say change is coming fast. But just where are we? If you don't have your plan started, are you behind the curve??

AllAnalytics reached out to several thought leaders in the areas of AI, machine learning, and advanced analytics to get their perspective. Their answers to the four questions we posed will help prepare you and your organization for

  • Big Data Analytics
  • IT Strategy
  • AllAnalytics
  • Details

Securing Privileged Access And The Swift Customer Security Controls Framework (CSCF)

by CyberArkSep 15, 2017

In an effort to establish a consistent secure framework and baseline of accountability, The Society of Worldwide Interbank Financial Telecommunication (SWIFT) has introduced the SWIFT Customer Security Controls Framework (CSCF).

Learn how you can leverage Privileged Account Security to assist with SWIFT CSCF compliance.

  • CyberArk
  • Risk Management/Security
  • Database Security
  • Details

Rapid Risk Reduction: A 30-Day Sprint To Protect Privileged Credentials

by CyberArkSep 15, 2017

For this CISO View research report, we drew from the experiences of security professionals and technical experts who have been on the front lines of breach remediation efforts. It provides a unique, inside look at the lessons learned from several high-profile data breaches.

This report outlines a proven framework for an intensive sprint of approximately 30 days, to implement a set of key controls around privileged credentials. The recommendations, developed in collaboration with our

  • CyberArk
  • Risk Management/Security
  • Database Security
  • Details

Get Your Enterprise Ready for GDPR

by CyberArkSep 15, 2017

Prepare for GDPR with a Privileged Account Security Checklist for Securing Personal Data. This practical checklist will help you evaluate not only your ability to avoid financial penalties and liability associated with GDPR, but implement a stronger enterprise security posture moving forward better protecting all your valuable corporate data, your customer relationships, and your brand and business partnerships.

  • CyberArk
  • Security Monitoring
  • Database Security
  • Details

The Voice of the Enterprise CISO

by NSS LabsSep 12, 2017

CISOs have plenty to keep them up at night. With data breaches, ransomware incidents, and system compromises keeping them on their toes, security leaders are forced to find ways to beat threats without slowing their pace of business. If they fail to effectively manage those risks, their organizations face huge consequences.

While security leaders recognize that process and people play a huge role in their security strategy, they also know that the right security technology stands as one

  • NSS Labs
  • Security Management & Analytics
  • Risk Management/Security
  • Details

Digital Transformation Myths & Truths

by InformationWeekSep 12, 2017

Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
IN THIS REPORT:
• Learn how to set realistic goals in terms of how and what need to be transformed in your environment
• Discover the major steps

  • InformationWeek
  • IT Strategy
  • Executive Insights & Innovation
  • Details

Revisiting the Cybersecurity Protection Myth

by CenturyLinkSep 08, 2017

This paper discusses why the "protect everything" security approach doesn't work in today's threat landscape and shares strategies for building a proactive, detection-centric plan.

  • CenturyLink
  • Cybersecurity
  • Security Monitoring
  • Details