sponsored by Tripwire, Inc.
Posted:  08 Feb 2011
Published:  08 Feb 2011
Format:  PDF
Length:  9  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

CISOs and their security programs face nearly overwhelm­ing pressure to take a renewed focus on data protection. The external forces of advanced threats and a multitude of compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protec­tion requirements. These requirements are then overlaid on an explosion in the volume of data generated and a variety of locations where that data may reside. And if that’s not enough, the scope of data to be protected includes not only customer data, but internal data and system data as well. Recognizing data protection as the underlying objective for informa­tion security programs and initiatives allows IT Security, Compliance and Operations teams to better align with a bridge-building end goal protecting the business and its customers.

Driven by expanding compliance obligations, increasingly sophisticated external threats and ever-changing business requirements, organizations are rediscovering the founda­tional concepts of information security objectives that focus on the protection of data. By its most literal defini­tion “information security” means the protection of data. But today both the volume and scope of the data to be pro­tected is much greater. Corporate security teams who build a security program around a clear objective such as data protection will tend to have better focus, clearer direction and a faster path to identifying threats and vulnerabilities before data is compromised. Just as in problem solving, where root-cause analysis provides better focus, a root objective such as data protection can be useful in driving security initiatives and providing improved focus for a security program. Read on to see an overview of the many data protection challenges CISOs face and a sequence of five actions to take to address these challenges.

 






BROWSE RELATED RESOURCES
CISOs | Compliance Best Practices | Data Loss Prevention (DLP) | Data Security | Information Security | Risk Management | Security Best Practices | Security Threats

View All Resources sponsored by Tripwire, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement