Information security program management
CISOs and information security programs are vital to protecting enterprises against today's cyber threats. In this resource centers, get the latest news and advice about CISO practices, infosec prrogram management and more.
Top Stories
- 
				Quiz
					22 Oct 2025
					
									
										  Cybersecurity awareness quiz: Questions and answersFrom phishing to patching, file sharing to MFA, find out how much you know about preventing cybersecurity incidents in this security awareness training quiz. Continue Reading By
- 
				Tip
					08 Oct 2025
						
										  Top 15 IT security frameworks and standards explainedSeveral IT security frameworks and standards exist to help protect company data. Here's advice for choosing the right ones for your organization. Continue Reading By
- 
                Tip
                24 Feb 2016
                  Cybersecurity products: When is it time to change them?Enterprises should assess their cybersecurity products to make sure they're as effective as possible. Expert Mike O. Villegas discusses how to evaluate cybersecurity tools. Continue Reading By- Mike O. Villegas, K3DES LLC
 
- 
                Answer
                01 Oct 2015
                  Should security funds be dedicated to hiring or tools?Security funds can be tough to come by, so when managers get them should they focus on strengthening security through hiring or through purchasing tools? Continue Reading By- Mike O. Villegas, K3DES LLC
 
- 
                Tip
                26 Aug 2015
                  Managed security service providers: Weighing the pros and consUsing a managed security service provider can be an appealing option to enterprises, but there are many factors to consider before making the move to outsourcing. Continue Reading By- Mike O. Villegas, K3DES LLC
 
- 
                Tip
                19 Jun 2015
                  State of the Network study: How security tasks are dominating IT staffThe majority of networking teams are regularly involved in enterprise security tasks. Expert Kevin Beaver explains the phenomena and how to embrace it. Continue Reading By- Kevin Beaver, Principle Logic, LLC
 
- 
                Answer
                06 May 2015
                  How should we hire for specialized information security roles?A rise in specialized roles puts extra pressure on security hiring. Expert Mike O. Villegas explains how to meet this demand and find talented security professionals. Continue Reading By- Mike O. Villegas, K3DES LLC
 
- 
                Answer
                04 May 2015
                  The CEO refuses cybersecurity best practices: Now what?Some executives don't think cybersecurity best practices apply to them. Expert Mike O. Villegas explains how to handle that situation. Continue Reading By- Mike O. Villegas, K3DES LLC
 
- 
                Tip
                19 Mar 2015
                  Is the CISO job description getting out of hand?CISO roles and responsibilities are built on impossible standards and unrealistic expecations. Expert Joseph Granneman explains this trend and why enterprises need to reverse it. Continue Reading By- Joseph Granneman, Illumination.io
 
- 
                Tip
                02 Feb 2015
                  Getting to know the new GIAC certification: GCCCThe new GIAC certification, GCCC, is not a very specific certification, but it could prove useful in organizations. Expert Joseph Granneman explains why. Continue Reading By- Joseph Granneman, Illumination.io
 
- 
                Tip
                09 Jan 2015
                  How to increase the importance of information security in enterprisesExpert Mike Villegas explains how to use the Three C's to emphasize the importance of information security within an organization. Continue Reading By- Mike O. Villegas, K3DES LLC
 
- 
                News
                05 Oct 2011
                  Security innovation must hurdle academic, regulatory roadblocksRegulators, lawmakers, academia share equal blame in putting the brakes on innovation in security, experts say Continue Reading - 
                Answer
                03 Feb 2010
                  Security report template: How to write an executive reportWriting a security report for executives doesn't have to be difficult or extensive, but security management expert Ernie Hayden describes how to make it comprehensive and clear. Continue Reading By- Ernie Hayden, 443 Consulting LLC
 
- Feature 03 Jul 2008
- Feature 03 Jul 2008
- 
                Definition
                09 May 2008
                  anti-money laundering software (AML)Anti-laundering software is a type of computer program used by financial institutions to analyze customer data and detect suspicious transactions... (Continued) Continue Reading 
- 
                Tip
                17 Jan 2008
                  Your physical security budget: Who pays and how much?In many organizations, the cost of data center security is a shared expense -- or at least it should be. How much then should you be spending on security and how much of that should be picked up by other business units? Continue Reading By
 
                            