1<!DOCTYPE html>
2
3Anonymous
4/bestp
5/bestp/domrep.nsf
6A6E2ECEABFC07A6885257290005CFE48
8
9
10
11
12
13
140
15
16
17/bestp/domrep.nsf/products/protecting-corporate-assets-securing-data-and-proprietary-information?opendocument
18
19opendocument
2054.226.58.177
21
22
23www.best-in-class.com
24/bestp/domrep.nsf
25DB




Products & Services Business Operations Information Technology

Protecting Corporate Assets: Securing Data and Proprietary Information

DB Image

ID: 4945


Features:


Pages/Slides: 26


Published: Pre-2013


Delivery Format: Online PDF Document


 

License Options:

close

Single User: Authorizes use by the person who places the order or for whom the order was placed.

Sitewide: Authorizes use of the report for a geographic site. All people at site can view the report for a year and copies can be printed.

Corporate: Authorizes use for the entire company for a year and copies can be printed. No limitations for usage inside the company.

Buy Now

 

919-403-0251

  • STUDY OVERVIEW
  • BENCHMARK CLASS
  • SPECIAL OFFER

Non-members: Click here to sign-up for a complimentary tour of
"Protecting Corporate Assets: Securing Data and Proprietary Information"


STUDY OVERVIEW

As more and more companies allow their employees to work from home, require them to travel for business, and provide them with laptops, the resultant portability of sensitive and proprietary data presents serious security risks. This study was designed to develop a cross-industry perspective on how companies prioritize data and proprietary information security in their day-to-day functions. The study outlines the methods employed both within and outside companies to ensure training, tools, and procedures are in place to protect sensitive information in an age of increasing employee and hardware mobility.

This study will assist those IT professionals, managers and directors seeking to benchmark their own Data Security functions and to understand how other organizations train their employees, contract outside relationships and prioritize actions during a security breach.

KEY TOPICS

Internal and External Data Security
Contractor Relationships
Crisis Management
Lessons Learned


SAMPLE KEY FINDINGS

Internal Methods for Securing Data:
Only one benchmark partner used two-factor authentication for system access. A majority of the benchmark class requires only a complex password with an expiration date to access secure data.

Industries Profiled:
Professional Services; Pharmaceutical; Telecommunications; Financial Services; Utilities; Government; Chemical; Health Care


Companies Profiled:
KPMG; Apotex; Embarq; AXA Equitable; First Energy; State of Oregon Dept. of Human Services; ABN AMRO; Department of Veteran's Affairs; Telefonica Moviles; Monsanto; Tiscali; New Brunswick Power; Yakima Valley Farm Workers Clinic


If you purchase Best Practice Database document(s), you will have 30 days from the date of purchase to apply some or all of the cost of the document(s) toward the cost of a Full Access Individual, Pharma, Group or University Membership. Write us at DatabaseTeam@bestpracticesllc.com or call David Guinn at 919-767-9179 if you have any questions.