In storage and security circles alike, weve all heard the great debate about roles and responsibilities as they pertain to information security. Some feel this should be the concern of the CISO while others say that it falls into the IT Storage camp, with data encryption being the current panacea for achieving regulatory compliance. Gain further insight and understanding of where the interests of the CIO and CISO converge on the topic of information security, delivered from the core issues and objectives that drive the discussion around information security into the technologies that support these drivers. Experts from Hitachi Data Systems lift the veil on this topic, going beyond encryption and technology alone into the holistic process of securing the information infrastructure that will hold value for the storage and security practitioners alike.
Subscribe to our NewsletterLoading...
Tag CloudAnti Virus Protection Backtrack Blackhat Blog Botnet Cisco Cloud Security Cracking Cyber Security cyber security conference Data Security Educational Purposes Exploit Free Anti Virus Google Hack Hacking Hard Drive Recovery Honey Pot Honeypot Internet Security Lessons Learned Linux Mainstream Malware Management Tools Metasploit Mitm Network Security Nmap Passwords Penetration Penetration Testing Remote Exploit Security Test Speakers Ssl Steganography Symantec Testing Tool Voip Testing Vulnerabilities Wireshark Zero Day Zeus