Premium Content

Access "Encryption, DLP, disaster recovery top 2009 priorities"

Published: 20 Oct 2012

Without a doubt, compliance demands and fears of bad publicity from stolen or lost data continue to push security to the top of corporate agendas. But a deepening recession could put a real squeeze on security efforts this year. Readers who participated in Information Security's Priorities 2009 survey ranked data protection, threat management and other security initiatives as top concerns. At the same time, 27 percent of the more than 900 respondents expect their security budgets to remain flat and 23 percent are delaying some purchases. More than half expect security budget cuts if the economy doesn't rebound. "With tightening budgets, anything that's not essential will probably be put on hold," says Justin Drain, data security manager at Fremont Bank in the San Francisco Bay Area. "If what you have planned isn't designed to deal with compliance or an active threat, it would make sense to put it on hold." Kevin Dickey, CISO and deputy CIO for Contra Costa County in the San Francisco Bay Area, doesn't have much choice. Data protection is a priority for him, ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Next-generation firewalls play by new rules
    ism_cover_0913.png
    E-Zine

    Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...

  • Developing your endpoint security management transition plan
    endpoint_security_management_cover_0913.png
    E-Handbook

    This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...

  • Unlock new pathways to network security architecture
    ISM_august_2013.png
    E-Zine

    Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...