INFOGRAPHIC

At-a-Glance: How IT and Infosec Value Privacy

This infographic examines how IT and privacy teams work in concert, so that their respective spends can complement one another.


Published: 1 March 2016

View infographic

As a more mature field, information security has long enjoyed larger budgets and more staff than information privacy. As privacy teams have matured and grown, however, their budgets are beginning to be substantive. How do information security and privacy teams work in concert, so that their respective spends can complement one another? Are their priorities aligned? Have firms decided that information privacy investments can enhance information security? What privacy functions are valuable in mitigating a data breach?

This infographic, which draws from the How IT and Infosec Value Privacy Report, examines how IT and privacy teams work in concert, so that their respective spends can complement one another.

CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

Data securityIncident managementPrivacy engineeringRisk managementStrategy and governanceFinance and bankingTechnologyTelecommunicationsPrivacyCybersecurity law
INFOGRAPHIC

At-a-Glance: How IT and Infosec Value Privacy

This infographic examines how IT and privacy teams work in concert, so that their respective spends can complement one another.

Published: 1 March 2016

View infographic

As a more mature field, information security has long enjoyed larger budgets and more staff than information privacy. As privacy teams have matured and grown, however, their budgets are beginning to be substantive. How do information security and privacy teams work in concert, so that their respective spends can complement one another? Are their priorities aligned? Have firms decided that information privacy investments can enhance information security? What privacy functions are valuable in mitigating a data breach?

This infographic, which draws from the How IT and Infosec Value Privacy Report, examines how IT and privacy teams work in concert, so that their respective spends can complement one another.

CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

Data securityIncident managementPrivacy engineeringRisk managementStrategy and governanceFinance and bankingTechnologyTelecommunicationsPrivacyCybersecurity law

Related resources