Steps to Secure Data


SecureState –

SecureState President and CEO, Ken Stasiak, discusses current issues in information security in a weekly video. Ken answers Summer's questions and provides viewers with tips to improve their business security program.

In this week's video, Ken discusses the security steps to take in 2010.

  • Determine what type of data you hold
  • Take Inventory of your systems that store, process and transmit data
  • System Flows-Inputs and Outputs
  • Risk Assessment/Gap Analysis
  • Threats, Vulnerabilities and Technologies

Watch previous weeks' State of Security videos.

Free Course: JavaScript: The Good Parts
View Comments
You Might Like
Join the discussion
Be the first to comment on this article. Our Commenting Policies