Download this episode
Organizations today struggle with the challenge of maintaining the privacy and confidentiality of personal information and intellectual property, as well as meeting associated regulatory compliance obligations. In this talk we analyze a proposed process, as well as the tools and techniques (including threat modeling) to: a) rationalize relevant requirements from laws and regulations, b) select the appropriate controls to meet these requirements, and c) select the appropriate products and configurations to meet control objectives. We discuss the use of this process and tools in cloud and in mixed environments.
Available formats for this video:
Actual format may change based on video formats available and browser capability.
Event HomepageTech·Ed North America 2010
More episodes in this series
Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.