Skip to main content

Posts

Showing posts from March, 2020

The Perfect Travel Security Policy for a Globe-Trotting Laptop

There are many challenges to safely carrying data and equipment on international travels, but the right policy can make navigating the challenges easier and more successful. organizations need to ask themselves a series of questions about the data. Is the data and information contained with the device worth more than the device itself? What are the local laws in the country being entered? What is the result to both the individual and the organization if all data on the device were compromised or released? What is the effect of device encryption? The Risk-Based Approach To properly assess the risk of a trip, there are five questions that must be asked in the process: What is on the device? Who owns it? How is it being used and secured? Why is it needed overseas? Where will it be located and for how long? Ask the Questions Before travel begins, Warshawsky said there should be a formal, documented series of steps the traveler must take. Pre-travel briefing...

Asset Security - Objectives

Understand key asset terms such as assets, information, data, resources, etc. Explain how security controls are dictated by the value of assets, including information. Understand that information assets that organizations need to protect based on the value of those assets to the organization. Explain how asset classification drives the protection of assets based on value. Describe the asset lifecycle. Understand how data classification and categorization applies to the asset lifecycle. Understand the importance of establishing accountability and responsibilities for information ownership and custodianship. Explain account abilities and responsibilities for protection of assets by owner, custodians, stewards, controllers, and processors. Explain key terms associated with asset protection. Understand how privacy of personal information is affected by today’s technologies. Explain the expectations of subjects according to privacy laws and regulations. Explain the importa...