Five Data Types To Consider When Conducting A Risk Assessment

Following the enthusiastic response to their "Get Smarter About Disaster Response — Five Resolutions For 2018" [https://ibm.co/2mc4tAP], Mitch Mayne and Loren Dealy Mahler are back to take a more in-depth look at the first resolution on their list: conducting a risk assessment. Listen now to learn about the five distinct data types your enterprise may hold or interact with and why performing an effective risk assessment means widening your lens to view how a data breach might affect your organization's reputation and business processes as well as its security posture. For more insights from Loren, visit the Communications War Room [http://bit.ly/2ErCswO] and to hear more from Mitch, subscribe to the Security Intelligence podcast [https://apple.co/2FizUmi] and never miss an episode.

Om Podcasten

Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940