Information Security Leader, Author, Instructor and Speaker

Default utility Image

Lessons Learned from Six Major Data Breaches “Every security breach that we read about in the news provides us with an opportunity to reflect upon the root …Continue reading →

Default utility Image

IDC PlanScape: Building an Analytics Center of Excellence “Analytics centers of excellence serve as the nucleus of an organization’s data transformation efforts,” says Mike Chapple, adjunct analyst with …Continue reading →

Default utility Image

Five Ways to Modernize Digital Certificate Management “Digital certificates aren’t the most exciting issue in IT, and they’re not top of mind for most senior IT leaders …Continue reading →

Default utility Image

Designing a Risk Management Strategy for SaaS Solutions “Organizations are adopting cloud technology as a routine business practice. SaaS vendors offer compelling business cases for reducing cost, increasing …Continue reading →

Default utility Image

IDC PlanScape: Threat Intelligence Solutions TAGS: “Threat intelligence is a foundational component of a modern cybersecurity program,” says Mike Chapple, adjunct analyst with IDC’s IT Executive …Continue reading →

Default utility Image

The CIO’s Playbook: Preparing for Data Breach Notifications TAGS: | | “The days and hours immediately after a data breach are critical,” said Mike Chapple, adjunct research analyst with IDC’s IT …Continue reading →

Default utility Image

IDC’s Worldwide Digital Transformation Use Case Taxonomy, 2019: Higher Education “To continue to be relevant to society and to students, all institutions face the need to transform their academic capabilities …Continue reading →

Default utility Image

Security Automation: Eight Things You Can Do Now for Security at Scale TAGS: “Automation plays an increasingly important role in cybersecurity programs,” said Mike Chapple, adjunct research analyst at IDC’s IT Executive Programs. “Automation serves …Continue reading →

Default utility Image

IDC PlanScape: Launching a Bug Bounty Program TAGS: “Bug bounty programs incentivize security researchers to test your systems for weaknesses and then provide you with an opportunity to fix the …Continue reading →

Default utility Image

Security Certifications: Seven Things CIOs Need to Know TAGS: “Cybersecurity certification programs play an important role in our professional community,” said Mike Chapple, adjunct research analyst, IDC. “They demonstrate …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple