- Publication year : 2022
1~2 item / All 2 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~2 item / All 2 items
A Must-See for Information Security Personnel! As laws and standards related to personal information are being established worldwide, the total amount of data utilized and managed by organizations is increasing daily. Many organizations are actively using cloud services, leading to heightened attention on the shared responsibility model in the cloud and methods for data deletion. There are numerous challenges faced by cloud users regarding data management and data deletion management in the cloud, and users are seeking solutions to these issues. In this seminar, we will invite industry experts to discuss the cloud's shared responsibility model, data deletion in environments where physical destruction cannot be performed, and data deletion management compatible with Amazon S3.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWhat is the role of IT asset management in cybersecurity measures? As cloud computing and remote work become more widespread, endpoint asset management is essential in the face of ever-evolving cyberattacks. One of the best practices in security frameworks, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), states that "identification" is the starting point for cybersecurity measures to understand an organization's situation, resources, and risks, with "asset management" being prioritized among these efforts. In this seminar, we will discuss the initiatives of IT asset management, which is an old yet new theme in cybersecurity measures, the challenges faced by many organizations and their response approaches, as well as the efficient data erasure management using IT asset management systems at the end of the IT asset lifecycle.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration