Secure and resilient enterprise

Primary tab navigation

Spotlight

As New Office With the new generation of mobile workers, the definition of workplace is changing. Discover how your office can take advantage.

With the new generation of mobile workers, the definition of workplace is changing. Discover how your office can take more advantage. less

Security Essentials for the CIO -- a series from the IBM Center for Applied Insights Managing threats to information security requires vigilance and a set of proactive practices and capabilities to safeguard the enterprise. This eight-part series discusses the threats to be managed and the technology, process and policy measures CIOs should pursue to protect information.

Managing threats to information security requires vigilance and a set of proactive practices and capabilities to more safeguard the enterprise. This eight-part series discusses the threats to be managed and the technology, process and policy measures CIOs should pursue to protect information. less

Security Essentials for the CIO -- a series from the IBM Center for Applied Insights

Managing threats to information security requires vigilance and a set of proactive practices and capabilities to safeguard the enterprise. This eight-part series discusses the threats to be managed and the technology, process and policy measures CIOs should pursue to protect information.

Develop an effective business continuity and resiliency strategy (PDF, 1.2MB) In an era of 24x7 commerce and expectation, the enterprise must be highly resilient and able to anticipate risks both accidental and intentional, and manage through both natural disasters and man-made disruptions. What’s needed is a business continuity and resiliency strategy that identifies risk factors and plans for the unexpected.

In an era of 24x7 commerce and expectation, the enterprise must be highly resilient and able to anticipate risks both accidental and more intentional, and manage through both natural disasters and man-made disruptions. What’s needed is a business continuity and resiliency strategy that identifies risk factors and plans for the unexpected. less

Research and Insights

How IT risks can shape a company’s reputation and value (PDF, 808KB) Discover how executive views align in this special report based on findings in the global Reputational Risk Study

CEOs, CIOs and CFOs often have widely divergent opinions on the effect of IT risk on their companies’ reputations and more reputational risk management practices. Read a special executive point of view report based on the global Reputational Risk Study to understand if such differences of opinion are encouraging exploration of all areas of risk and potential solutions. less

Finding a Strategic Voice Discover the emerging security trends from the 2012 IBM Chief Information Security Officer (CISO) study and how your business can adopt them.

Discover the emerging security trends from the 2012 IBM Chief Information Security Officer (CISO) study and how your more business can adopt them. less

Keeping pace with the rapidly changing security landscape (US) Insights from the 2012 IBM Chief Information Security Officer Assessment

The 2012 Chief Information Security Officer assessment from IBM’s Center for Applied Insights reports that Information more security is an enterprise-wide priority. Forward-thinking leaders identified in this global survey are taking a more proactive, integrated and strategic approach to addressing information security threats. less

Video

Selected video placeholder text

Playlist

Recent videos

Case studies

Making everyone a risk manager (00:02:54) The Chief Risk Officer at the University of California explains why

Enterprise Risk Management is far more than purchasing insurance at the University of California. In the past 5 years, the more Chief Risk Officer has been able to reduce the UC system's cost of risk over 420 million dollars by building constituencies across different disciplines and reshaping risk management around a model in which everyone is a risk manager. less

Managing risk with disaster recovery and business resiliency planning (WMV, 11.5MB) Download and view the CSX Technology Video

CSX Technology uses IBM disaster recovery and resiliency planning solutions to manage risk in a 24x7 environment.

Railroad to recovery (WMV, 11.5MB) The Chief Risk Officer at the University of California explains why

American railway company, CSX is realising the cost and efficiency benefits of their disaster recovery solution thanks to more its real-time data mirroring environment designed by IBM. less

Solutions

An intelligent and integrated approach to IT security (US) Learn more about IBM Security solutions

IBM Security solutions provide a comprehensive security framework that spans hardware and software along with the more service expertise to provide integrated security solutions customised for your unique needs and designed to lower your total cost of ownership. less

Optimize business continuity, improve regulation management and enable quicker recovery from unanticipated disasters (US) Learn more about compliance, availability and data protection

IBM Business Continuity and Resiliency Services can help you maintain near-continuous business operations more and assist in managing regulatory compliance, improved systems availability, data protection and the integration of IT operational risk management strategies. less

I'm here to help

  • Luke Macfarlane

    Luke Macfarlane

    IBM C-Suite Specialist

  • Or call me at: +61294079658
  • mobile: +61-412022922

Newsletter

Tweets

C,The Customer-activated Enterprise,Sub title: Insights from the Global C-suite Study

Ten years, 17 studies and 23,000 face-to-face executive interviews have given us rich insights into how private and public sector leaders think. ‘The Customer-activated Enterprise’ is our first simultaneous study of the entire C-suite.