Cybersecurity » Getting Control Of Information Security To Protect IP

Getting Control Of Information Security To Protect IP

April 9, 2015

Securing company intellectual property requires a total systems approach, one that extends the reach of “Enterprise Risk Management” (ERM) into the world of cybersecurity. It sounds like an abstract concept, but this post from Pamela Passman, President and CEO of the Center for Responsible Enterprise And Trade, breaks it down and suggests how it can translate into an effective program. Components include “inventory,” broadly defined to include where information is stored, who has access to it and how that access is monitored. “A remarkable number of companies do not have a handle on what they need to protect,” Passman writes. It also includes policies, which translate into procedures, which are then facilitated by training, training which might need to extend to suppliers and partners.

Read full article at:

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top