Risk Assessments/Management, Data Security, Breach, Security Architecture, Application security, Endpoint/Device Security, Endpoint/Device Security, Network Security, Security Strategy, Plan, Budget, Vulnerability Management, Patch/Configuration Management, Incident Response, TDR, Threat Management, Threat Management, Malware, Phishing, Governance, Risk and Compliance, Compliance Management, Privacy, Critical Infrastructure Security, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

SC Magazine survey – Preventing a data breach

Share

A legion of data exposures have occurred over the past year, with many affected companies not only being forced to address customer and investor concerns, but also pay fines and adhere to prolonged sets of requirements administered by the Federal Trade Commission. So just how is news of such breaches, exposures and possible thefts affecting the way organizations -- large and small -- focus on information security plans?

This survey, Guarding against a data breach, aims to find out and should take less than 15 minutes to complete.

Click here to take the survey by Wednesday, Oct. 31.

To thank you for your time, we will send you a copy of the full results at no charge. Additionally, you will be placed in a drawing to receive one of two available full conference passes to the RSA Conference 2008, which will be held in San Francisco, California from April 7 - 11.

Analysis of the feedback will appear in the form of a special section in the January 2008 edition of SC Magazine. All feedback will be analyzed in aggregate and responses will remain anonymous.

Click here to take the survey.

An In-Depth Guide to Application Security

Get essential knowledge and practical strategies to fortify your applications.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.