Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Encryption as an Enterprise Strategy: an Ians Custom Report
Bookmark Share

Electronic Resource

Encryption as an Enterprise Strategy: an Ians Custom Report

Shackleford, Dave - Personal Name; Institute for Applied Network Security - Organizational Body;

In the last ten years, the number of data breaches and major cases involving sensitive data exposure have grown dramatically. Starting in 2005 with the ChoicePoint breach, we’ve seen a steady increase of data breaches that have exposed payment card information, healthcare records, personally identifiable information (PII), passwords and other authentication details, and more. Major breaches have occurred at Heartland Payments, Home Depot, Adobe, Target, Sony, Anthem and many other organizations both large and small with security teams, compliance requirements, and numerous security controls in place.
With the growing reality that breaches are not only possible but likely, how can organizations prevent attackers from gaining any useful information? In the recent hack of the United States Office of Personnel Management (OPM), Aaron Boy of The Federal Times states that “The biggest misstep in the breach of Office of Personnel Management networks was not the failure to block the initial breach but the lack of encryption, detection and other safeguards that should have prevented intruders from obtaining any useful information.”1
For this paper, IANS conducted an independent survey of over 100 information security professionals to better understand how they are contending with more advanced attackers trying to compromise systems and steal data, all while moving into cloud and outsourced service models where they may have little, if any, control over many of the more traditional security controls we’re used to implementing. 64% of the respondents indicated that they were in security management (manager and director-level positions) with the remaining group (36%) stating that they were in senior executive positions such as Vice President, CSO, CISO, CTO, and CIO. The focus of the questions was decidedly strategic in nature, and we wanted to ensure that senior influencers and decision makers were the focus of the survey.


Availability

No copy data

Detail Information
Series Title
-
Call Number
-
Publisher
: Vormetric Data Security., 2015
Collation
13 hlm.; pdf;
Language
English
ISBN/ISSN
-
Classification
Unclass
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
Encryption
Specific Detail Info
-
Statement of Responsibility
Dave Shackleford
Other version/related

No other version available

File Attachment
  • ENCRYPTION AS AN ENTERPRISE STRATEGY - AN IANS CUSTOM REPORT
  • ENCRYPTION AS AN ENTERPRISE STRATEGY - AN IANS CUSTOM REPORT
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?