Information Security Leader, Author, Instructor and Speaker

Default utility Image

IDC PlanScape: Threat Intelligence Solutions TAGS: “Threat intelligence is a foundational component of a modern cybersecurity program,” says Mike Chapple, adjunct analyst with IDC’s IT Executive …Continue reading →

Default utility Image

The CIO’s Playbook: Preparing for Data Breach Notifications TAGS: | | “The days and hours immediately after a data breach are critical,” said Mike Chapple, adjunct research analyst with IDC’s IT …Continue reading →

Default utility Image

IDC’s Worldwide Digital Transformation Use Case Taxonomy, 2019: Higher Education “To continue to be relevant to society and to students, all institutions face the need to transform their academic capabilities …Continue reading →

Default utility Image

Security Automation: Eight Things You Can Do Now for Security at Scale TAGS: “Automation plays an increasingly important role in cybersecurity programs,” said Mike Chapple, adjunct research analyst at IDC’s IT Executive Programs. “Automation serves …Continue reading →

Default utility Image

IDC PlanScape: Launching a Bug Bounty Program TAGS: “Bug bounty programs incentivize security researchers to test your systems for weaknesses and then provide you with an opportunity to fix the …Continue reading →

Default utility Image

Security Certifications: Seven Things CIOs Need to Know TAGS: “Cybersecurity certification programs play an important role in our professional community,” said Mike Chapple, adjunct research analyst, IDC. “They demonstrate …Continue reading →

Default utility Image

Cybersecurity Threats: Eight Things CIOs Need to Know TAGS: “It’s no secret that cybersecurity adversaries have become increasingly sophisticated over the past few years,” says Mike Chapple, adjunct research …Continue reading →

Default utility Image

Cybersecurity Insurance: Five Things CIOs and Businesses Need to Know TAGS: This IDC Perspective identifies five crucial principles that IT executives must understand about the use of cybersecurity insurance to transfer …Continue reading →

Default utility Image

Encryption: Six Principles That CIOs Need to Know TAGS: “Encryption is an intimidating technology for many IT leaders because it is highly technical and relies upon complex mathematical algorithms. …Continue reading →

Default utility Image

IDC PlanScape: Threat Hunting TAGS: | | “Threat hunting is the latest trend in cybersecurity analytics,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple