Download this episode
Organizations today struggle with the challenge of maintaining the privacy and confidentiality of personal information and intellectual property, as well as meeting associated regulatory compliance obligations. In this talk we analyze a proposed process, as well as the tools and techniques (including threat modeling) to: a) rationalize relevant requirements from laws and regulations, b) select the appropriate controls to meet these requirements, and c) select the appropriate products and configurations to meet control objectives. We discuss the use of this process and tools in cloud and in mixed environments.
Available formats for this video:
Actual format may change based on video formats available and browser capability.