Though the intent of this question isn't clear, I recommend CSOs focus on internal policy documents, penetration...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
test results and the like. Obviously, that information is not available to outsiders. When trying to determine if a company has had data breach problems in the past, one place to look is the Privacy Rights Clearinghouse's Chronology of Data Breaches. Finally, correlate IP addresses to reputation services to figure out if there are fundamental issues that are present within an organization.
For more information:
Dig Deeper on Data Privacy and Protection
Related Q&A from Mike Rothman
In the world of security certifications, what is the GISP and how alike is it to the CISSP? In this security management expert response, learn about ...continue reading
Depending on your enterprise, it may or may not be necessary to utilize a QSA. In this security management expert response, learn how to determine ...continue reading
When developing software securely, what role does gap analysis play? In this security management expert response, learn how to implement gap analysis...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.