Training

Events , Fraud Management & Cybercrime , Fraud Summit

Policy Driven Security - Deploy Only Those Security Technologies and Controls That You Need

Policy Driven Security - Deploy Only Those Security Technologies and Controls That You Need

Ripped from today's headlines in which company after company is reporting breaches of their information security, this session will provide a fresh perspective on some tried and true information security practices. While companies rush to spend dollars on improved technologies and contracting with third parties to build bigger fortresses around their data, many of them fail to address information security at the fundamental level through sound data governance and the implementation of layered security. Information security technology is only as good as the people using that technology and the policies under which such technology is implemented.

Returning to the Fraud Summit, attorney Ron Raether will speak on the importance of an enterprise-wide data governance policy, to include real-world examples of policy driving technology selection and implementation. Ron will also discuss the importance of security in depth and how such data governance should serve as but one of many layers in an enterprise-wide information security plan, tying these concepts into various regulatory regimes.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.