Premium Content

Access "Computer Weekly Buyer's Guide to data security"

CWE_BG_April2012_datasecurity_252.png

Sponsored by ComputerWeekly.com

As the smartphone phenomenon has taken off, chief information security officers have needed to rethink what personal computing security really means –especially as the European Commission seeks to harmonise data protection law across EU member states.  Access >>>

Table of contents

  • How CISOs can keep up security best practice in a threat landscape in flux
  • Adapting to new data rules
  • How to navigate the EU data reforms
  • The issues businesses must consider to comply with EU data regulation

 

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • An Introduction to Quantum Lifecycle Management
    An-Introduction-to-Quantum-Lifecycle-Management-(1358517152_735).jpg
    E-Handbook

    Quantum Lifecycle Management (QLM) will enable the “Internet of Things” to have an impact on business and the world at large in a way similar to the ...

  • IT Project Management: Guide to estimating timescales and resources.
    Guide-to-estimating-timescales-and-resources-(1355416707_427).jpg
    E-Handbook

    This book extract explains how to estimate the timescales and effort required for IT projects.

  • Business Continuity Management Systems
    Business-Continuity-Management-Systems-(1355418477_903).jpg
    E-Handbook

    This downloadable extract focuses on the practical elements of business continuity management and considers them from a management system perspective...