Get started Bring yourself up to speed with our introductory content.

Fact or fiction: Building upon existing compliance infrastructure

In a fast-paced "fact or fiction" format, Burton Group's Trent Henry will discuss the must-have compliance technologies and how an organization can piggy-back existing infrastructure to satisfy the regulators.

SearchSecurity.com Security School
 

This tip is part of SearchSecurity.com's Compliance School lesson, Must-have compliance technologies. Visit the Must-have compliance technologies lesson page for additional learning resources. 

In a fast-paced "fact or fiction" format, Burton Group's Trent Henry discusses the must-have compliance technologies and how an organization can piggy-back existing infrastructure to satisfy the regulators.

Play now:
Download for later:

Download the podcast here!

  • Internet Explorer: Right Click > Save Target As
  • Firefox: Right Click > Save Link As

 

 

Dig Deeper on Audit and compliance planning

Fact or fiction: Inside extrusion detection and prevention technology According to our latest survey of more than 608 enterprise security pros, 80% of enterprises say protecting data is more important in 2007 than last year, and 72% admit they need a better strategy. SearchSecurity.com is responding to this growing need with a multi-lesson Data Protection Security School to help you formulate a comprehensive strategy to secure sensitive info throughout your network. With a new data breach headline in the news almost daily, plenty of infosec pros are looking for new ways to proactively spot potential data disclosure problems before they happen. Extrusion detection and prevention tools can help, but to be effective, practitioners must know what they can and can't do. This podcast will use the popular "fact or fiction" format to help sort out what is and isn't true about today's extrusion detection and prevention technology.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

ComputerWeekly.com

Close