ExpertiseTechnology |

Toggle Document Tree
Keeping your servers safe: Placing a value on business data
Keeping your servers safe: Placing a value on business data
Bob Wright, CEO, Vital International Ltd
Security and business continuity
Sign in to see this content:
Security and business continuity

How to make cloud computing work for you, safely and securely
Peter Allwood , Manager - Enterprise Risk Services, Deloitte LLP
- Peter Allwood outlines the fundamental precautions to take when working with the cloud, as well as offering advice on how to best prepare staff and technology for a potential information security breach
Peter Allwood , Manager - Enterprise Risk Services, Deloitte LLP
- Peter Allwood outlines the fundamental precautions to take when working with the cloud, as well as offering advice on how to best prepare staff and technology for a potential information security breach


Consolidating your IT security: Needs of growing businesses
Guido Sanchidrian , Principal Product Marketing Manager, Symatec
Guido Sanchidrian , Principal Product Marketing Manager, Symatec

Collaborating in a supply chain: Security risks
Tim Stone, Head of Collaboration Solutions, Europe, Cisco
Tim Stone, Head of Collaboration Solutions, Europe, Cisco

Collaborating in a supply chain: Examples of risks
Tim Stone, Head of Collaboration Solutions, Europe, Cisco
Tim Stone, Head of Collaboration Solutions, Europe, Cisco

Collaborating in a supply chain: Mitigating the risk
Tim Stone, Head of Collaboration Solutions, Europe, Cisco
Tim Stone, Head of Collaboration Solutions, Europe, Cisco

Social networking at work: The importance of policy
Tim Stone, Head of Collaboration Solutions, Europe, Cisco
Tim Stone, Head of Collaboration Solutions, Europe, Cisco

Social networking at work: Security risks
Tim Stone, Head of Collaboration Solutions, Europe, Cisco
Tim Stone, Head of Collaboration Solutions, Europe, Cisco

Social networking at work: Mitigating risks
Tim Stone, Head of Collaboration Solutions, Europe, Cisco
Tim Stone, Head of Collaboration Solutions, Europe, Cisco

IT security and your employees: Educating staff
Dan Bowyer, Managing Director, The Engine Room
Dan Bowyer, Managing Director, The Engine Room

IT security and your employees: Designing a successful policy
Dan Bowyer, Managing Director, The Engine Room
Dan Bowyer, Managing Director, The Engine Room

IT security and your employees: How much control is appropriate?
Dan Bowyer, Managing Director, The Engine Room
Dan Bowyer, Managing Director, The Engine Room

Business continuity planning: Why you need to do it
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd

Business continuity planning: Problems with tape backup
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd

Business continuity planning: Can you trust your IT function?
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd

Business continuity planning: Independent audit is key
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd

Business continuity planning: Testing exposes vendor problems
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd

Business continuity planning: Reluctantly giving up on a vendor
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd

Business continuity planning: Relationship between the board and IT function
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd
Jon Musker, Senior Infrastructure Analyst, Chaucer Syndicates Ltd

Practical steps to improving business security: Why security is a business issue
Richard Hunt, Managing Director, Turnkey Consulting
Richard Hunt, Managing Director, Turnkey Consulting

Practical steps to improving business security: Education and training
Richard Hunt, Managing Director, Turnkey Consulting
Richard Hunt, Managing Director, Turnkey Consulting

Practical steps to improving business security: Segregation of duties
Richard Hunt, Managing Director, Turnkey Consulting
Richard Hunt, Managing Director, Turnkey Consulting

Practical steps to improving business security: Continuous controls monitoring
Richard Hunt, Managing Director, Turnkey Consulting
Richard Hunt, Managing Director, Turnkey Consulting

Security challenges for growing compaines: Specific issues for growth businesses
Graham Titterington, Principal Analyst, Ovum
Graham Titterington, Principal Analyst, Ovum

Security challenges for growing compaines: Employee security
Graham Titterington, Principal Analyst, Ovum
Graham Titterington, Principal Analyst, Ovum

Security challenges for growing compaines: Risks and expansion
Graham Titterington, Principal Analyst, Ovum
Graham Titterington, Principal Analyst, Ovum


Security challenges for growing compaines: Must investment grow with the firm?
Graham Titterington, Principal Analyst, Ovum
Graham Titterington, Principal Analyst, Ovum

Security challenges for growing compaines: Key advice to growth businesses
Graham Titterington, Principal Analyst, Ovum
Graham Titterington, Principal Analyst, Ovum

IT security on a budget: Is it feasible to save money?
Graham Titterington, Principal Analyst, Ovum
Graham Titterington, Principal Analyst, Ovum

IT security on a budget: Making the best of what you have
Graham Titterington, Principal Analyst, Ovum
Graham Titterington, Principal Analyst, Ovum

IT security on a budget: Areas to ringfence
Graham Titterington, Principal Analyst, Ovum
Graham Titterington, Principal Analyst, Ovum

IT security from the CIO's viewpoint : Prioritiy issues
Christian McMahon, Chief Information Officer, GoIndustry-DoveBid plc
Christian McMahon, Chief Information Officer, GoIndustry-DoveBid plc

IT security from the CIO's viewpoint : How best to protect your laptops
Christian McMahon, Chief Information Officer, GoIndustry-DoveBid plc
Christian McMahon, Chief Information Officer, GoIndustry-DoveBid plc

IT security from the CIO's viewpoint : Firewall, browsers and other priorities
Christian McMahon, Chief Information Officer, GoIndustry-DoveBid plc
Christian McMahon, Chief Information Officer, GoIndustry-DoveBid plc

IT security from the CIO's viewpoint : The education role of security management
Christian McMahon, Chief Information Officer, GoIndustry-DoveBid plc
Christian McMahon, Chief Information Officer, GoIndustry-DoveBid plc

IT security from the CIO's viewpoint : Priorities, cost-cutting and what is at stake
Christian McMahon, Chief Information Officer, GoIndustry-DoveBid plc
Christian McMahon, Chief Information Officer, GoIndustry-DoveBid plc

Data and systems security: Eminent security threats
Colin Jones, Security sales specialist, Cisco
Colin Jones, Security sales specialist, Cisco

Data and systems security: Overseeing security protection
Colin Jones, Security sales specialist, Cisco
Colin Jones, Security sales specialist, Cisco

Flexible working: Security challenges of mobile employees
Guido Sanchidrián, Principal Product Marketing Manager EMEA, Symantec
Guido Sanchidrián, Principal Product Marketing Manager EMEA, Symantec

Flexible working: The right approach to protecting corporate data
Guido Sanchidrián, Principal Product Marketing Manager EMEA, Symantec
Guido Sanchidrián, Principal Product Marketing Manager EMEA, Symantec

Flexible working: Security versus convenience
Guido Sanchidrián, Principal Product Marketing Manager EMEA, Symantec
Guido Sanchidrián, Principal Product Marketing Manager EMEA, Symantec

Priorities in IT security: Current security issues
Guido Sanchidrián, Principal Product Marketing Manager EMEA, Symantec
Guido Sanchidrián, Principal Product Marketing Manager EMEA, Symantec

Priorities in IT security: How to protect yourself from threats
Guido Sanchidrián, Principal Product Marketing Manager EMEA, Symantec
Guido Sanchidrián, Principal Product Marketing Manager EMEA, Symantec

Priorities in IT security: The needs of growing businesses
Guido Sanchidrián, Principal Product Marketing Manager EMEA, Symantec
Guido Sanchidrián, Principal Product Marketing Manager EMEA, Symantec

Consolidating your IT security: The importance of secure messaging
Guido Sanchidrian , Principal Product Marketing Manager, Symatec
Guido Sanchidrian , Principal Product Marketing Manager, Symatec

Consolidating your IT security: Securing messaging systems
Guido Sanchidrian , Principal Product Marketing Manager, Symatec
Guido Sanchidrian , Principal Product Marketing Manager, Symatec

Consolidating your IT security: Motivating factors for businesses
Guido Sanchidrian , Principal Product Marketing Manager, Symatec
Guido Sanchidrian , Principal Product Marketing Manager, Symatec

Safeguarding your business on the web: How threats are changing
Guido Sanchidrian , Principal Product Marketing Manager, Symatec
Guido Sanchidrian , Principal Product Marketing Manager, Symatec

Safeguarding your business on the web: The options
Guido Sanchidrian , Principal Product Marketing Manager, Symatec
Guido Sanchidrian , Principal Product Marketing Manager, Symatec

Security challenges: Two emerging threats
Ed Gibson, Chief Security Advisor, Microsoft UK
Ed Gibson, Chief Security Advisor, Microsoft UK

Security challenges: Priorities and new responsibilties
Ed Gibson, Chief Security Advisor, Microsoft UK
Ed Gibson, Chief Security Advisor, Microsoft UK

Security challenges: The impact of cloud computing
Ed Gibson, Chief Security Advisor, Microsoft UK
Ed Gibson, Chief Security Advisor, Microsoft UK

Security challenges: The insider threat
Ed Gibson, Chief Security Advisor, Microsoft UK
Ed Gibson, Chief Security Advisor, Microsoft UK

Systems uptime: What is server availability?
Bob Wright, CEO, Vital International Ltd
Bob Wright, CEO, Vital International Ltd

Systems uptime: Minimising downtime
Bob Wright, CEO, Vital International Ltd
Bob Wright, CEO, Vital International Ltd

Systems uptime: The cost of uptime
Bob Wright, CEO, Vital International Ltd
Bob Wright, CEO, Vital International Ltd

Systems uptime: Who is responsible?
Bob Wright, CEO, Vital International Ltd
Bob Wright, CEO, Vital International Ltd

Keeping your servers safe: Why it's important
Bob Wright, CEO, Vital International Ltd
Bob Wright, CEO, Vital International Ltd

Keeping your servers safe: Placing a value on business data
Bob Wright, CEO, Vital International Ltd
Bob Wright, CEO, Vital International Ltd

Keeping your servers safe: Common security weaknesses
Bob Wright, CEO, Vital International Ltd
Bob Wright, CEO, Vital International Ltd

Keeping your servers safe: Having security validated by a third party
Bob Wright, CEO, Vital International Ltd
Bob Wright, CEO, Vital International Ltd

Data security: What does the law say?
Stewart Room, Partner, Field Fisher Waterhouse
Stewart Room, Partner, Field Fisher Waterhouse

Data security: Penalties and enforcement
Stewart Room, Partner, Field Fisher Waterhouse
Stewart Room, Partner, Field Fisher Waterhouse

Data security: What can go wrong for firms?
Stewart Room, Partner, Field Fisher Waterhouse
Stewart Room, Partner, Field Fisher Waterhouse

Data security: What your policy should include
Stewart Room, Partner, Field Fisher Waterhouse
Stewart Room, Partner, Field Fisher Waterhouse

Data security: Roles and responsibilities
Stewart Room, Partner, Field Fisher Waterhouse
Stewart Room, Partner, Field Fisher Waterhouse

Data security obligations: The role of ICO
Jonathan Bamford, Assistant Information Commissioner, ICO
Jonathan Bamford, Assistant Information Commissioner, ICO

Data security obligations: Investigation and enforcement
Jonathan Bamford, Assistant Information Commissioner, ICO
Jonathan Bamford, Assistant Information Commissioner, ICO

Data security obligations: Problems stemming from data loss
Jonathan Bamford, Assistant Information Commissioner, ICO
Jonathan Bamford, Assistant Information Commissioner, ICO

Data security obligations: Problems stemming from data misuse
Jonathan Bamford, Assistant Information Commissioner, ICO
Jonathan Bamford, Assistant Information Commissioner, ICO

Data security obligations: How ICO can help
Jonathan Bamford, Assistant Information Commissioner, ICO
Jonathan Bamford, Assistant Information Commissioner, ICO

Data security obligations: Culture and leadership
Jonathan Bamford, Assistant Information Commissioner, ICO
Jonathan Bamford, Assistant Information Commissioner, ICO

Data security obligations: Good practices to emulate
Jonathan Bamford, Assistant Information Commissioner, ICO
Jonathan Bamford, Assistant Information Commissioner, ICO
Click on the links to see more from this sequence:
|
Bob Wright is the CEO of Vital International Ltd, a company which runs secure data centres. Bob addresses the question of how business data should be valued, underlining the importance of different types of data to different businesses. |