Get started Bring yourself up to speed with our introductory content.

Identify and maintain ownership of data: A guide for CISSPs

The following video is from the Official (ISC)² CISSP OnDemand Training.

Unlike other parts of IT, the concept of "set it and forget it" is completely incompatible with information security requirements. After determining the ownership of data and under what conditions it should be accessed, infosec pros must continually ensure that its integrity, confidentiality and proper use is maintained.

Ongoing data audits, overlapping controls and thoughtful documentation are among the many tools CISSPs should call upon to promote good data management, explains Adam Gordon, lead editor of the Official (ISC)² Guide to the CBK, Fourth Edition, in this video.

CISSP® is a registered mark of (ISC)² Inc.

The following is a full transcript of Adam Gordon's video. 

View All Videos

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What's the best advice you've received about how to effectively define data ownership and maintain its integrity?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close