Access your Pro+ Content below.
Align your data protection efforts with GRC
This article is part of the Information Security magazine issue of July/August 2009
In today's security-conscious organization, there is a split between two competing security camps: the policy-driven governance, risk and compliance (GRC) group and the technology-driven data protection group. In the "ring of protection," the GRC camp and data protection camp are locked in a veritable "Smackdown," wrestling for the same buckets of resources and funding for their projects.. Ultimately, however, both sides need each other to succeed. Data protection tools such as DLP examine, block and report on unauthorized transmission of data which protects an organization against loss of sensitive and confidential information. In many organizations, they're being deployed as a stopgap measure while security managers develop and/or refine their long term protection strategies. But how do you configure a DLP service without proper security standards already in place? Vendors may offer "best practice" sets of configuration data, but be cautious: While they can be used as examples of the information needed to configure a DLP ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
While the 3FN.Net shutdown had limited impact on cybercriminals, it signaled that the private sector and the government are serious about illegal activity.
Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts.
DNSSEC brings PKI to the Domain Name System and prevents dangerous cache poisoning attacks. Implementation difficulties and political battles, however, keep it from going mainstream.
Unified threat management (UTM) appliances offer consolidated security services in a single, manageable firewall/VPN appliance. But purchase and use only the security options you need. Otherwise you will pay too much for the appliance and for tools that won't make your business more secure
Columns in this issue
Security's leading thinkers ask Google to turn on HTTPS by default for Gmail, Docs and Calendar.
Data protection and compliance teams battle for resources but need each other to succeed.