sponsored by ComputerWeekly.com
Posted:  24 Feb 2012
Published:  24 Feb 2012
Format:  PDF
Length:  15  Page(s)
Type:  Essential Guide
Language:  English
ABSTRACT:

 

 

This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.

 

The research reaches some counter-intuitive conclusions and highlights some significant security issues that could easily be overlooked.

 

Click on the button below to download this report.

 

Summary:

  1. Identify and Justify the Best Home for Information Security
  2. Take a Measured Response to Advanced Persistent Threats
  3. Expand Efforts for Social Engineering Awareness
  4. Revisit Efforts on Malicious Insiders
  5. Use Physical Security Tools to Enhance Information Security
  6. Make Regulatory Compliance a Priority, but Don’t Lose Focus on Security Basics
  7. Create a Single Global Breach Notification Plan
  8. Actively Avoid Being a Target of Hacktivism
  9. Stop Impeding the Benefits of Mobility
  10. Prepare for the End of the Corporate BlackBerry

Click on the button below to download this report.

 

 

The Corporate Executive Board identifies the best business solutions to challenging functional and IT management problems facing CIOs. Its solutions are vendor independent and sourced from a vast executive network that spans the C-suite

 






BROWSE RELATED RESOURCES
Business Continuity Planning | CISOs | Compliance Best Practices | Data Loss Prevention (DLP) | Denial of Service Attacks | Hackers | Mobile Device Management | Mobile Workers | Phishing | Risk Assessment | Risk Management | Security | Security Best Practices | Security Management | Security Policies | Security Threats | Smart Phones

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement