Remove Disaster Recovery Remove Information Security Remove Policies Remove Security
article thumbnail

Is your security program based on hard evidence or compliance voodoo?

IT Toolbox

What do you think of when you hear information security ? If you’ve been working in and around IT for a while, I’m guessing that things like documented security policies, network and endpoint controls, user training, disaster recovery plans and the like come to mind.

article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

By Bob Gourley DC seems to have a cyber security related event every week. Here are details from the invite: Don’t miss this exciting opportunity to join 1500 IT leaders and innovators on March 11 to collaborate and discuss the top issues in IT security and management. Learn how agencies are turning to BYOD to ensure security and ROI.

Symantec 261
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight on Cybersecurity Leaders: Donna Ross

SecureWorld News

Donna Ross is a senior security and compliance executive with over 20 years of diverse risk, compliance, cybersecurity, technology, and operations experience within the manufacturing, insurance, banking, financial services, healthcare, and retail sectors. A : Information Security. A : Making a difference and challenging work!

article thumbnail

Cybersecurity Culture: How Princeton University's Security Team Created It

SecureWorld News

When David Sherry became Chief Information Security Officer at Princeton University, he says cybersecurity was done well. "I I don't want you to think security at Princeton was some sort of vast wasteland. I wanted to make security both cultural and programmatic.". Developing a culture of security: the mission statement.

article thumbnail

8 data strategy mistakes to avoid

CIO Business Intelligence

How enterprises gather, store, cleanse, access, and secure their data can be a major factor in their ability to meet corporate goals. They also need to establish clear privacy, regulatory compliance, and data governance policies. Many industries and regions have strict regulations governing data privacy and security,” Miller says.

Strategy 136
article thumbnail

Cybersecurity e NIS2: come si muovono i CIO per dormire sonni (un po’) più tranquilli

CIO Business Intelligence

Quest’anno, a rafforzare la spinta verso la sicurezza informatica c’è anche la Direttiva NIS2 (“Network and information system security”) dell’UE, che andrà a sostituire la precedente NIS, aggiornando le misure per un elevato livello di cybersicurezza in tutta l’Unione Europea. CIO, Cybercrime, Data and Information Security

Dell 105
article thumbnail

How to Improve Your Organization’s Cyber Resiliency

CIO Business Intelligence

The practice brings together formerly separate disciplines of information security, business continuity, and disaster response (BC/DR) deployed to meet common goals. With a risk-based approach to cyberresilience, organizations evolve practices and design security to be business-aware. The HPE GreenLake Advantage.

How To 89