Managing threats to information security requires vigilance and a set of proactive practices and capabilities to more… safeguard the enterprise. This eight-part series discusses the threats to be managed and the technology, process and policy measures CIOs should pursue to protect information. less
In an era of 24x7 commerce and expectation, the enterprise must be highly resilient and able to anticipate risks more… both accidental and intentional, and manage through both natural disasters and man-made disruptions. What’s needed is a business continuity and resiliency strategy that identifies risk factors and plans for the unexpected. less
Learn the preventative measures that can improve security in this report from IBM's Institute for Business Value. In an more… increasingly connected world, the frequency and scope of data loss, “distributed denial of service” attacks and “social hacktivism” reinforce the need to protect assets aggressively and proactively. less
Research and Insights
The 2013 IBM Chief Information Security Officer Assessment continues and expands upon the work more… of the “2012 IBM CISO Assessment – Finding a strategic voice”. With a goal of identifying organization practices and behaviors that can strengthen the role of information security leaders, the IBM Center for Applied Insights interviewed senior leaders responsible for information security in their organization to uncover new insights. less
Mobile enterprises can attract new customers, transform business and IT infrastructure, develop mobile apps to boost enterprise efficiency, and improve customer service and interactions. more… Read The "upwardly mobile" enterprise, a new study from the IBM Institute for Business Value, to learn how leading enterprises rise to the top, including ROI, analytics, integration, and security. less
The 2012 Chief Information Security Officer assessment from IBM’s Center for Applied Insights reports that more… Information security is an enterprise-wide priority. Forward-thinking leaders identified in this global survey are taking a more proactive, integrated and strategic approach to addressing information security threats. less
An overview of the unique challenges of security a cloud environment
Learn more about emerging threats to mobile security
Discover how organizations can create a culture that is risk aware but not risk averse and how a CIO can play a proactive role in leading the enterprise to managing risk as a business opportunity.
Implications of Service Interruption: Sky News Business interview of IBM global risk expert on risky business and the need for ensuring continuous service availability (7:20)
Sky News Business interview of IBM global risk expert on risky business and the need for ensuring continuous service availability
CSX Technology uses IBM disaster recovery and resiliency planning solutions to manage risk in a 24x7 environment.
Enterprise Risk Management is far more than purchasing insurance at the University of California. In the past more… 5 years, the Chief Risk Officer has been able to reduce the UC system's cost of risk over 420 million dollars by building constituencies across different disciplines and reshaping risk management around a model in which everyone is a risk manager. less
IBM Security solutions provide a comprehensive security framework that spans hardware and software along with the more… service expertise to provide integrated security solutions customized for your unique needs and designed to lower your total cost of ownership. less
IBM Business Continuity and Resiliency Services can help you maintain near-continuous business operations more… and assist in managing regulatory compliance, improved systems availability, data protection and the integration of IT operational risk management strategies. less