395 KB | 3 files | DOC, PDF
Security breaches that lead to exposure of personally identifiable information (PII) are embarrassing and costly to your enterprise. This guide will help establish a risk-based approach to protecting private information.
Breaches of personally identifiable information (PII) have increased dramatically over the past few years and have resulted in the loss of millions of records. Breaches of PII are hazardous to both individuals and organizations. Individual harms may include identity theft, embarrassment, or blackmail. Organizational harms may include a loss of public trust, legal liability, or high costs to handle the breach. To appropriately protect the confidentiality of PII, organizations should use a risk-based approach. This document provides guidelines for a risk-based approach to protecting the confidentiality of PII.
The attached Zip file includes:
This guide will assist organizations and system owners in making practical sanitization decisions based on the categorization of confidentiality of their information. ... More >>
In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise. ... More >>
The management of cryptographic keys is a critical and challenging security management function, especially in the case of a cloud environment. ... More >>