Infosec White Papers

[highlight color=”” border_color=”” background_image=”https://ciso.eccouncil.orgwp-content/uploads/2013/09/about_us_1.jpg” background_attachment=”fixed” background_position=”center center” background_stretch=”no” min_height=”300″ first_page=”yes” last_page=”no” padding_top=”50″ padding_bottom=”10″ margin_bottom=”” fullwidth=”yes”]

[divider style=”2″ align=”left” size=”normal” variant=”normal” dimension=”3px” color=”#1e73be” scrolltext=””]White Papers[/divider] [special_text tagname=”h1″ pattern=”no” color=”#1e73be” font_size=”16″ font_weight=”300″ font=”default” margin_top=”” margin_bottom=”” align=”center”]Here you will find the white papers contributed by EC-Council’s CISO Community to further the education of information security practitioners at the highest levels. If you have a white paper to share with our community, please email [email protected] for information on what we can offer you![/special_text] [divider style=”1″ align=”center” size=”normal” variant=”normal” dimension=”1px” color=”” scrolltext=””][/divider] [space height=”20″]
[promo header=”Click Here to Read” content=”” url=”https://ciso.eccouncil.orginfosec-white-papers/creating-secure-computer-user/” target=”_parent” image=”https://ciso.eccouncil.orgwp-content/uploads/2016/07/whitepaper-cover-keyaan.jpg”]
[special_text tagname=”h2″ pattern=”yes” color=”#062b50″ font_size=”16″ font_weight=”bold” font=”default” margin_top=”” margin_bottom=”” align=”center”]CREATING A SECURE COMPUTER USER[/special_text] [special_text tagname=”h4″ pattern=”no” color=”#062b50″ font_size=”12″ font_weight=”300″ font=”default” margin_top=”” margin_bottom=”” align=”center”]- By: Keyaan Williams
Sr. Executive, CCISO Program, EC-Council[/special_text]
[promo header=”Click Here to Read” content=”” url=”https://ciso.eccouncil.orginfosec-white-papers/high-price-faking-pci-compliance-status/” target=”_parent” image=”https://ciso.eccouncil.orgwp-content/uploads/2013/09/resources_6.png”]
[special_text tagname=”h2″ pattern=”yes” color=”#062b50″ font_size=”16″ font_weight=”bold” font=”default” margin_top=”” margin_bottom=”” align=”center”]THE HIGH PRICE OF “FAKING” YOUR PCI COMPLIANCE STATUS[/special_text] [special_text tagname=”h4″ pattern=”no” color=”#062b50″ font_size=”12″ font_weight=”300″ font=”default” margin_top=”” margin_bottom=”” align=”center”]- By: Todd Bell
Global IT Security, Setting Strategy & Building Programs,Rearchitecture Design[/special_text]
[promo header=”Click Here to Read” content=”” url=”https://ciso.eccouncil.orginfosec-white-papers/target-neiman-marcus-michaels/” target=”_parent” image=”https://ciso.eccouncil.orgwp-content/uploads/2013/09/resources_1.png”]
[special_text tagname=”h2″ pattern=”yes” color=”#062b50″ font_size=”16″ font_weight=”bold” font=”default” margin_top=”” margin_bottom=”” align=”center”]TARGET, NEIMAN MARCUS AND MICHAELS ARE NOT THE ONLY COMPANIES TO BLAME FOR THE RECENT SECURITY BREACHES[/special_text] [special_text tagname=”h4″ pattern=”no” color=”#062b50″ font_size=”12″ font_weight=”300″ font=”default” margin_top=”” margin_bottom=”” align=”center”]- By: Todd Bell
Global IT Security, Setting Strategy & Building Programs, Rearchitecture Design[/special_text]
[promo header=”Click Here to Read” content=”” url=”https://ciso.eccouncil.orginfosec-white-papers/wargaming-chief-information-security-officers/” target=”_parent” image=”https://ciso.eccouncil.orgwp-content/uploads/2013/09/resources_4.png”]
[special_text tagname=”h2″ pattern=”yes” color=”#062b50″ font_size=”16″ font_weight=”bold” font=”default” margin_top=”” margin_bottom=”” align=”center”]WARGAMING FOR CHIEF INFORMATION SECURITY OFFICERS[/special_text] [special_text tagname=”h4″ pattern=”no” color=”#062b50″ font_size=”12″ font_weight=”300″ font=”default” margin_top=”” margin_bottom=”” align=”center”]- By: Nitin Kumar
CMC, C|CISO, CISSP, PMP, CGEIT[/special_text]
[promo header=”Click Here to Read” content=”” url=”https://ciso.eccouncil.orginfosec-white-papers/shield-your-business/” target=”_parent” image=”https://ciso.eccouncil.orgwp-content/uploads/2013/09/resources_8.png”]
[special_text tagname=”h2″ pattern=”yes” color=”#062b50″ font_size=”16″ font_weight=”bold” font=”default” margin_top=”” margin_bottom=”” align=”center”]SHIELD YOUR BUSINESS –
COMBAT PHISHING ATTACKS[/special_text] [special_text tagname=”h4″ pattern=”no” color=”#062b50″ font_size=”12″ font_weight=”300″ font=”default” margin_top=”” margin_bottom=”” align=”center”]- By: Sameer Shelke
CISSP, CISA, BS7799 LA, ITIL[/special_text]
[promo header=”Click Here to Read” content=”” url=”https://ciso.eccouncil.orginsider-threat-report-ten-steps-thwarting-insider-threat/” target=”_parent” image=”https://ciso.eccouncil.orgwp-content/uploads/2015/07/KevinPeak-download.png”]
[special_text tagname=”h2″ pattern=”yes” color=”#062b50″ font_size=”16″ font_weight=”bold” font=”default” margin_top=”” margin_bottom=”” align=”center”]INSIDER THREAT REPORT: THE TEN STEPS TO THWARTING THE INSIDER THREAT[/special_text] [special_text tagname=”h4″ pattern=”no” color=”#062b50″ font_size=”12″ font_weight=”300″ font=”default” margin_top=”” margin_bottom=”” align=”center”]- By: Kevin McPeak, CISSP, ITILv3
Technical Architect, Security, Public Sector Strategic Programs, Symantec Corporation[/special_text]
[/highlight]