This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.



Welcome to the IDC European CISO Summit Knowledge Centre, where you'll find a range of documents, publications and resources that will prepare you for your attendance at the summit.


Threat Intelligence Report

DXC’s monthly Threat Intelligence Report provides a strategically oriented roundup of the latest threats, breaches, cybercrimes and nation state activities. Combining information from public and proprietary sources including DXC’s global network of security operations centers and cyber intelligence services, this report is part of DXC Labs | Security, which provides insights and thought leadership to the security industry.

VMware NSX

The Business Value of Software-First Networking with VMware NSX

IDC research demonstrates the value of VMware NSX as part of a software-first approach to networking in terms of network cost optimization, ensuring efficient IT network operations, improving network agility and performance, and better positioning the network to support the business operations.

Business Value of Software-First Networking with VMware NSX

As enterprises worldwide pursue digital transformation and make software a strategic emphasis for competitive differentiation and a key enabler of business outcomes, the datacenter network must be similarly modernized and transformed through a software-first approach to network architecture, provisioning, and day-to-day management.

The Seven Cybersecurity Misconceptions Every CIO Should Dispel And practical advice on what CIOs should do next

You’ve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit.

Paloalto Networks

Picking a Winner in Detection and Response

EDR Challenges and Cortex XDR Benefits

Redefine Security Operations with XDR

The goal of any security team is to defend an organization’s infrastructure and data from damage, unauthorized access, and misuse. Security architects and engineers typically take a layered approach to prevention. As attacks have become more automated and complex, this approach has grown to include layered visibility in the form of detection and response products, such as endpoint detection and response (EDR), network traffic analysis (NTA), and security information and event management (SIEM).

Top Security Orchestration Use Cases

Security orchestration is a method of connecting disparate security tools, teams, and infrastructures for seamless and process-based security operations and incident response. Security orchestration acts as a powerful enabler for security automation, since well-connected security systems are more receptive to automation and scale.

Making Each Day Safer And More Secure Than The One Before

Palo Alto Networks, the global cybersecurity leader, is shaping the future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of security, protecting tens of thousands of organizations across clouds, networks, and mobile devices.


Reinventing Cybersecurity with Artificial Intelligence - The new frontier in digital security

Artificial intelligence (AI) has already been deployed in a multitude of applications to increase productivity, improve sales or enhance experiences. However, one crucial, though often overlooked AI application, is the focus of this report – enhancing protection against cyberattacks.

Championing Data Protection and Privacy - a source of competitive advantage in the digital century

Last year, our comprehensive study – Seizing the GDPR Advantage: From mandate to high-value opportunity – established that compliance with data protection and privacy regulations can be a source of competitive advantage for organizations.

The Modern, Connected CISO - From Responders to Drivers of Change

There is a shift in both attitude and perception. The CISO function is less of a blocker and much more of a change agent.


HP Embedded Printers Security Video (ProRes)

The world's most secure printing. Video highlighting the security features of HP Printers. Featuring the Fixer (Jonathan Banks) Pro-Res Version

HP Embedded Printers Security

The world's most secure printing. Video highlighting the security features of HP Printers. Featuring the Fixer (Jonathan Banks) Pro-Res Version

Top 5 security Vulnerabilities

Cybersecurity risk is everywhere in your organization. But, did you know that some of your biggest vulnerabilities are hiding in plain sight? Fact is, if you are like the large corporations we’ve assessed, your organization isn’t covering common cyber-hygiene practices with your MFP and copier fleet.

HP enterprise-level security solutions with HP Secure MPS strengthen print environment for DreamWorks Animation

DreamWorks Animation, one of the most admired family entertainment brands in the world, is renowned for animated feature films such as Shrek, Madagascar, Kung Fu Panda, and How to Train Your Dragon. A division of the Universal Filmed Entertainment Gr


U.S. Incident Readiness, Response, and Resiliency Services 2018 Vendor Assessment — Beyond the Big 5 Consultancies

While traditional incident response is focused on identifying and containing a security breach or attack, this document broadens the scope to include pre-attack readiness and post-attack resiliency. IDC believes that service providers need to evolve beyond a point-in-time engagement, to both satisfy increasing demand for security consulting and remain competitive and viable.


World’s #1 Most Widely Used Privacy Management Software

Fast Track Your Compliance with CCPA, GDPR, LGPD, ISO & Hundreds of Global Privacy Laws & Security Frameworks

OneTrust Data Inventory & Mapping


Contact Us