Use the summary briefs below to jump to full descriptions of each video.
| | |||||||
| ||||||||
PART 1: SECURING DATA IN MOTION In part one of this data protection video series, Spire Security's Pete Lindstrom discusses: PART 2: SECURING DATA MOTION In part two of this data protection video series, Spire Security's Pete Lindstrom discusses: PART 3: SECURING DATA IN MOTION In part three of this video series, Spire Security's Pete Lindstrom evaluates various protection technologies and strategies within the framework of a comprehensive information risk management strategy. PART 4: SECURING DATA IN MOTION
Information can escape from your organization through every endpoint and device, and as an information security specialist, it's your job to make sure that data doesn't get into the wrong hands -- hands that could cause your company's trade secrets to become public knowledge. Even worse, your customer's data could leak out and next thing you know, you are facing a law suit.
Data protection has become a top concern for today's enterprises. As more companies make headlines for data breaches and lost customer information, the need to properly secure company and customer data is at an all-time high.
Do you cringe when you read about a lost laptop? Are you nervous that your Internet connection might be a giant intellectual-property sieve? Despite widespread regulatory and contractual stipulations for data protection, chances are that your organization hasn't developed a wholly effective architecture for thwarting sensitive information leakage.
In part four of this video series, Spire Security's Pete Lindstrom evaluates various protection technologies and strategies and discusses:
Security Management Strategies for the CIO
Pete Lindstrom is Research Director for Spire Security, an industry analyst firm focused on information security issues and market research. Lindstrom combines Fortune 500 corporate security experience with audit and consulting work for Coopers & Lybrand (now PriceWaterhouseCoopers) to offer clients a real-world view to evaluating, selecting and implementing the latest security technologies for enterprises.
Join the conversationComment
Share
Comments
Results
Contribute to the conversation