Guarding against a data breach

Share this article:
Guarding against a data breach
Guarding against a data breach

Guarding against a data breach

Date: March 12, 2013
Time: 11:00 a.m. PT/2:00 p.m. ET

Click here to register

Our sixth-annual data breach survey, which polled IT security pros in the U.S. as well as those working in the U.K. and Australia, yielded interesting insights on how organizations are dealing with today's data security threats. And, while the majority of pros are optimistic about the steps they're taking to safeguard critical data from getting lost or stolen, many still cite plenty of challenges with which they must contend. We examine some of the more intriguing results of the survey and hear from Stephen Fridakis, chief information security officer of the Food and Agriculture Organization of the United Nations, on what he interprets from the feedback. Fridakis will share various measures he and his peers intend to implement in order to keep data out of the wrong hands.


Featured speakers:
Stephen Fridakis, chief information security officer, Food and Agriculture Organization of the United Nations
Illena Armstrong, VP of editorial, SC Magazine

Sponsored by:


Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

Protecting your core assets

Maintaining even the most basic IT security controls is becoming more challenging for organizations as cloud computing, mobile and bring-your-own-device (BYOD) reshape the average corporate network and how it is used.

Wanted: Buy-in from the board

As massive breaches occur with more frequency, consumers have become increasingly anxious about just how large retail, financial and other companies with which they're dealing are protecting their personal information.

Unlocking the conundrum of advanced evasion techniques (AETs)

As various industry organizations, such as the Community Emergency Response Team (CERT) in Finland, work with numerous IT security vendors and other experts to figure out the countless vulnerabilities that can allow advanced evasion techniques (AETs) to sneak through networks, organizations plagued by AETs are ...