WEBINAR: Live Event Date: September 20, 2017 @ 1:00 p.m. ET / 10:00 a.m. PT
Designing a Proactive Approach to Information Security with Cyber Threat Hunting REGISTER >
IT security involves a relatively straightforward risk-management equationthe more security you put in place, the more onerous it is for end usersand until the technology arrives to make impenetrable security invisible to end users, it will remain that way. The CIOs we surveyed clearly fall on the side of increased security, and while they fault their non-IT cohorts for lack of security awareness, they appear to be realistic about the burden it puts on their companies' business units. But CIOs aren't instituting enough of the high-profile risk-assessment measures that would increase awareness of the problem throughout their corporations.