Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Preparing your Organization for the Inevitable HIPAA Audit

Preparing your Organization for the Inevitable HIPAA Audit

A four step guide to protecting your organization’s reputation and your customers’ data

Brought to you by
Egress

#IMCUS Slides: Effectively Connecting with Your Future Talent: Understanding the Profile of the New Cybersecurity Specialist

The complete slide deck from the recent session on understanding the profile of the new cybersecurity specialist as presented at Infosecurity Magazine Conference in Boston.

#IMCUS Slides: Winning the Cybersecurity Talent War – How to Successfully Attract, Recruit And Retain Top Talent

The complete slide deck from the recent session on hot to successfully attract, recruit and retain talent as presented at Infosecurity Magazine Conference in Boston.

#IMCUS Slides - Securing the User: Winning Hearts & Minds to Drive Cyber Secure Behavior

The complete slide deck from the recent session on securing the user as presented at Infosecurity Magazine Conference in Boston.

#IMCUS Slides: Securing Smart City Technology Adoption: Managing Privacy & Cyber Risk

The complete slide deck from the recent session on securing smart city technology adoption as presented at Infosecurity Magazine Conference in Boston.

IMCUS Slides: Articulating Risk to Senior Management: Enabling Informed Decision-Making

The complete slide deck from the recent session on articulating risk to senior management as presented at Infosecurity Magazine Conference in Boston.

#IMCUS Slides: Keeping up with Next-Generation of Cyber Risks: Securing the Connected Car

The complete slide deck from the recent session on securing the connected car as presented at Infosecurity Magazine Conference in Boston.

#IMCUS Slides: Implementing a Dynamic Security Strategy to Support Business Innovation & Digital Transformation

The complete slide deck from the recent session on dynamic security strategy as presented at Infosecurity Magazine Conference in Boston.

#IMCUS Slides: Deploying Dynamic User Access Controls

The complete slide deck from the recent session on the software defined perimeter as presented at Infosecurity Magazine Conference in Boston.

Brought to you by
Cryptzone

How to Produce a World-Class Threat Intelligence Capability

How to Produce a World-Class Threat Intelligence Capability

Discover the six core competencies that comprise a successful threat intelligence program.

Brought to you by
Recorded Future

CISSP® Planning Kit

CISSP Planning Kit: Your Guide to CISSP Certification and Beyond. Studying for the CISSP exam can seem overwhelming, which is why (ISC)2 developed this quick guide. Download this planning kit for a CISSP overview, study tips, preview of how to maintain your certification, and more!

Brought to you by
(ISC)²

Preparing for the GDPR: DPOs, PIAs, and Data Mapping

Preparing for the GDPR: DPOs, PIAs, and Data Mapping

With the General Data Protection Regulation coming online in the European Union by May 2018 — by its own terms affecting organizations worldwide that collect or process EU citizens’ personal data — we have an opportunity to test how ready privacy professionals are for a contemporary and comprehensive privacy regulation that makes obligatory many of the last decade’s “privacy-on-the-ground” practices.

Brought to you by
TRUSTe

What’s Hot on Infosecurity Magazine?