Security School

Manage Learn to apply best practices and optimize your operations.

Realigning your enterprise's data protection strategies

Knowing how to address data breaches requires proper training, preparation and technologies. David Sherry explains why and offers tips to get the job done.

Introduction

Just as enterprise security defenses mature and strengthen, so do the attacks that adversaries use. Learning from the past and realigning your enterprise data protection priorities now is critical to lessening the consequences when an incident does occur.

Not long ago, credit card numbers were the favorite target of organized online criminals, now they covet identity information. In this Security School lesson, expert David Sherry explains how organizations should react to this shift and discusses how to reprioritize your enterprise's data protection strategies to ensure data remains safe before, during and after a potential breach.

About the author:
As chief information security officer of Brown University, David Sherry is charged with the development and maintenance of Brown's information technology security strategy, IT policies and best practices, security training and awareness programs, as well as ongoing risk assessment and compliance tasks. A CISSP and CISM, Sherry has 20 years of experience in information technology. He previously worked at Citizens Bank, where he was vice president for enterprise identity and access management, providing leadership for compliance and security governance.

1Articles-

The right prep brings the right security

In these two articles, David Sherry explains how enterprises can improve data protection with foresight, action and proper training.

Tip

Improve corporate data protection with foresight, action

Better corporate data protection demands foresight and concrete action. Learn why breach training, monitoring and early detection capabilities can minimize damage when hackers attack. Continue Reading

Tip

How to prevent phishing attacks: User awareness and training

In this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put a dent in phishers’ attempts at spear phishing. Continue Reading

2Presentations-

To secure today's data, use today's security

In these two presentations, David Sherry discusses the past, present and future of information security, and outlines how modern attacks work to help enterprises reassess their data protection strategies.

Video

Learn from the past: Ensure a secure future of information security

To ensure the future of information security, enterprises must learn from the past, launch proper training and install the right technologies. Continue Reading

Video

Realign your data protection strategy efforts

In this video, learn what you need to do to realign your strategic focus to counter new threats by first understanding what’s important to your business. Continue Reading

3Audio-

Secure your greatest threat -- your employees

Listen in as David Sherry outlines five ways to combat social engineering attacks and learn how to master the task of employee security-awareness training.

Podcast

Five ways to prepare employees for social engineering scams

Social engineering scams are abundant, proper preparation and training is key to avoiding the danger. Expert David Sherry discusses social engineering basics and explains how to keep employees out of harm's way. Continue Reading

4Quiz-

Test your knowledge

After watching the videos, reading the tips and listening to the podcast, be sure to test your knowledge with this exclusive quiz.

Take This Quiz

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close