Compliance with information-security legal obligations and protecting proprietary information have become increasingly difficult, given this decade’s ever-increasing universe of types of data leakage. Extreme advances in information technology and data mobility have exacerbated the ramifications of inevitable human error. Exciting new platforms such as social-networking/Web-2.0 sites and “the cloud” often catch on without adequate risk-assessment.
A number of measures can help any organization do its best to protect sensitive information. Often there are additional benefits to be reaped if those measures are a product of a collaboration between multiple constituencies, such as Legal, IT and HR.
For more information on how to register, click here.