How security leaders are building risk-based cybersecurity programs
Security is an ever evolving landscape. Chief information security officers and leaders need a solid strategy and method for prioritizing security investments. In this year’s assessment we found:
Read the executive summary based on in-depth interviews by Southern Methodist University. We identify the top three challenges and three ways to develop better risk-based cybersecurity programs.
“Good compliance does not equal good security.”
Shaping security problem slovers: Academic insight to fortify for the future
In a follow-up to the 2014 CISO assessment, we interviewed cybersecurity academics who held a range of responsibilities within their universities. First and foremost, the interviewees did what many of our CISO Assessment respondents have over the years: point out the various imperfections, concerns and issues afflicting today's information security practices. But the interviewees didn't stop at identifying problems—they also offered ways in which these challenges could be addressed through actions within academia.
The path of security leadership
A new standard for security leaders: Insights from the 2013 IBM Chief Information Security Officer Assessment
Finding a strategic voice: Insights from the 2012 IBM Chief Information Security Officer Assessment
Join the conversation
Meet the Authors
Manager, IBM Center For Applied Insights
David is a Manager with IBM's Center for Applied Insights. He specializes in developing thought leadership on emerging issues in business and technology to enable organizations to achieve higher levels of value.
Principal, IBM Center For Applied Insights
Cynthya Peranandam is Principal Consultant for the IBM Center for Applied Insights, providing data-driven thought leadership to foster strategic conversations. Previously, she led marketing strategy for IBM Social Business solutions and IBM’s private cloud platform. Cynthya has worked with clients across the digital spectrum, and has driven adoption and commercialization of emerging technology through IBM's early-adopter program. She is the author of numerous blogs and reports about business and technology.