sponsored by Silver Tail Systems
Posted:  22 Feb 2011
Published:  22 Feb 2011
Format:  PDF
Length:  12  Page(s)
Type:  eGuide
Language:  English

After the Google Inc. and several other large IT firms discovered they were the targets of a high-profile Chinese hacker attack, CISO’s are concerned if they could be next. This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.

CISOs | Compliance Best Practices | Cybersecurity | Cyberterrorism | Federal Information Security Management Act of 2002 | Regulatory Compliance | Risk Management | Security Management | Security Threats

View All Resources sponsored by Silver Tail Systems

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement