Guarding against a data breach

Share this article:
Guarding against a data breach
Guarding against a data breach

Guarding against a data breach

Date: March 12, 2013
Time: 11:00 a.m. PT/2:00 p.m. ET

Click here to register

Our sixth-annual data breach survey, which polled IT security pros in the U.S. as well as those working in the U.K. and Australia, yielded interesting insights on how organizations are dealing with today's data security threats. And, while the majority of pros are optimistic about the steps they're taking to safeguard critical data from getting lost or stolen, many still cite plenty of challenges with which they must contend. We examine some of the more intriguing results of the survey and hear from Stephen Fridakis, chief information security officer of the Food and Agriculture Organization of the United Nations, on what he interprets from the feedback. Fridakis will share various measures he and his peers intend to implement in order to keep data out of the wrong hands.

Featured speakers:
Stephen Fridakis, chief information security officer, Food and Agriculture Organization of the United Nations
Illena Armstrong, VP of editorial, SC Magazine

Sponsored by:

Share this article:

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

Make It Stop! Protecting Corporate Data Assets Against Breach

SCMagazine's 2014 Data Breach Survey shows companies are taking steps to raise security awareness and investing in IT security and risk management practices but given the number of breaches and other high profile cyber crimes that have occurred more recently, are they doing enough?

Compliance gets you on the road to security

Today there is a veritable alphabet soup of data security standards and laws governing how companies must operate. But, most agree, compliance is more of a first step to security rather than an assurance of security itself.

Battling savvy cyber thieves

The methods cyber attackers use to infiltrate networks are endless. There is no doubt that the more sophisticated bad guys looking to steal specific data have enlisted surreptitious ways to achieve their ends.