![]() |
|
This quiz is part of the SearchSecurity.com Data Protection Security School lesson Executing a data governance strategy. Visit the lesson page for additional learning resources.
If you answered two or more questions incorrectly, revisit the materials from
SearchSecurity.com's Data Protection Security School lesson Executing a
data governance strategy :
- Webcast: Creating an
enterprise data protection framework
- Tip: Enterprise
data management: Analyzing business processes and infrastructure for data protection
- Podcast: Fact or fiction:
Don't forget about your intellectual proerty
If you answered four or more questions correctly, return to SearchSecurity.com's Data Protection Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.
This was first published in October 2007
Security Management Strategies for the CIO