> (ISC)² > Data Leak Protection Planning

Data Leak Protection Planning

Published By: (ISC)²
(ISC)²
Published:  Oct 15, 2010
Length:  11 pages

Most organizations are working hard to prevent data leaks, but the ever-changing IT landscape is making this difficult. Technologies such as cloud computing, as well as the increased use of e-mail, allow information to flow seamlessly in and out of corporate networks. “The challenge,” says Rob Ayoub, CISSP, global program director of network security at market research firm Frost & Sullivan, “is providing security for all of these interactions, particularly when it’s not in the company’s network anymore.” When employees take their laptops or smartphones home or on the road, “the security protection offered at the office doesn’t go with them,” he adds.   Read this paper about the four-step approach to establishing leading data protection practices and much more.



Tagsisc2, data leak, protection planning, data protection, cloud computing, security, employee