Premium Content

Access "Computer Weekly Buyer's Guide to data security"

CWE_BG_April2012_datasecurity_252.png

Sponsored by ComputerWeekly.com

As the smartphone phenomenon has taken off, chief information security officers have needed to rethink what personal computing security really means –especially as the European Commission seeks to harmonise data protection law across EU member states.  Access >>>

Table of contents

  • How CISOs can keep up security best practice in a threat landscape in flux
  • Adapting to new data rules
  • How to navigate the EU data reforms
  • The issues businesses must consider to comply with EU data regulation

 

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Social Media: IT Purchasers get social, marketers play catch up ?
    VB-CW social media PowerPoint (2)-1.jpg
    E-Handbook

    IT decision makers are using social media effectively at work, but marketers are playing catch up, according to this research snapshot.

  • Can national security and privacy co-exist?
    CWE_260814_ezine_22p-1MED.jpg
    E-Zine

    In this week’s Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how ...

  • Cultivating IT Talent
    CWE_190814_ezine_24p-1MED.jpg
    E-Zine

    While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses...