As many governance, risk and compliance (GRC) professionals can attest, information security strategy is of the utmost importance in today's connected workplace. Increased use of mobile devices and social media, coupled with the fact that organizations are creating and distributing more information than ever, creates daily data security headaches from the CIO or compliance officer on down.
In a series of articles published on our sister site, SearchCIO.com, analysts from Forrester Research Inc. have presented several information security strategy tips that can help. Read these top articles for advice on data protection in the modern workplace, aligning business with IT security initiatives and how the right staff is essential to your information security strategy.
A cost-effective yet targeted approach to mobile management is ideal as the use of smartphones in the office expands. Forrester Research analysts Benjamin Gray and Christian Kane outline why a mobile operations and security specialist is essential for an effective, long-term mobile strategy.
More on information security strategy
Book excerpt: Network Forensics: Tracking Hackers through Cyberspace
The extended enterprise encompasses mobile, social and cloud technologies, and requires decisive security countermeasures. Chenxi Wang, Forrester Research vice president and principal analyst, explains four immediate strategic and tactical priorities for the connected organization.
Business executives still often view anyone from IT security as a "paranoid custodian" blocking progress and innovation, according to Forrester Research's Stephanie Balaouras and Andrew Rose. But, they say, a new type of security pro -- the chief business security officer -- can help bridge the gap between IT security and business initiatives.
As cyberthreats continue to escalate, IT environments grow increasingly complex. Spending on information security teams is rising but, at the same time, finding talent is harder than ever. Forrester Research analyst Andrew Rose offers seven tips for nabbing the right people.
Ultimate guide to IT security strategy for CIOs