|Item type||Current location||Call number||Status||Date due||Barcode||Item holds|
Title from title frames.
In Process Record.
Originally produced by WatchIT in 2017.
Over the past decade, we have witnessed a true paradigm shift in global computing. This technological revolution has been led by familiar players such as the Internet, wireless communication and Cloud Computing and is complimented by a host of clever devices that keep today's mobile workforce productive and on the move. However, with all the good news associated with these impressive technological achievements come some significant challenges, particularly in the critical area of privacy and security. . In this report, expert Kevin Jones, Senior Information Security Engineer for Thycotic Software, explores the impact ''technology change'' is having on enterprise security policies. By viewing this report, IT and business professionals will be better able to keep their security policies up-to-date and keep damaging internal and external threats and attacks at bay.. After successfully completing this segment you should be able to:. • Understand the key security concepts that professionals need to recognize and comprehend. • Discuss the difference between a risk-centric and a threat-centric approach to security. • Identify the key elements often missed with risk management programs and processes
Mode of access: World Wide Web.