Network SecurityBuilding on IT security to protect all intellectual propertyPamela PassmanApril 7, 2015To extend the ERM approach to information and IP, companies need to create a comprehensive inventory of sensitive data and intellectual property that are key to their competitiveness.