In our information security series so far, we’ve covered the rules and regulations regarding information privacy and security, discussed key information security practices at the desktop and on mobile devices, and discussed mitigating financial risk through cyber insurance. In this episode, we will end the series by delving into the use of leading edge technology that enables adherence to some of the more difficult aspects of regulatory compliance - access control and monitoring. Join us as our experts talk about best practices in the use of technology to achieve data privacy and security c
|