Steps to Secure Data
SecureState President and CEO, Ken Stasiak, discusses current issues in information security in a weekly video. Ken answers Summer's questions and provides viewers with tips to improve their business security program.
In this week's video, Ken discusses the security steps to take in 2010.
- Determine what type of data you hold
- Take Inventory of your systems that store, process and transmit data
- System Flows-Inputs and Outputs
- Risk Assessment/Gap Analysis
- Threats, Vulnerabilities and Technologies
Watch previous weeks' State of Security videos.