At-a-Glance: How IT and Infosec Value Privacy
This infographic examines how IT and privacy teams work in concert, so that their respective spends can complement one another.
Published: 1 March 2016
As a more mature field, information security has long enjoyed larger budgets and more staff than information privacy. As privacy teams have matured and grown, however, their budgets are beginning to be substantive. How do information security and privacy teams work in concert, so that their respective spends can complement one another? Are their priorities aligned? Have firms decided that information privacy investments can enhance information security? What privacy functions are valuable in mitigating a data breach?
This infographic, which draws from the How IT and Infosec Value Privacy Report, examines how IT and privacy teams work in concert, so that their respective spends can complement one another.

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.
At-a-Glance: How IT and Infosec Value Privacy

This infographic examines how IT and privacy teams work in concert, so that their respective spends can complement one another.
Published: 1 March 2016
As a more mature field, information security has long enjoyed larger budgets and more staff than information privacy. As privacy teams have matured and grown, however, their budgets are beginning to be substantive. How do information security and privacy teams work in concert, so that their respective spends can complement one another? Are their priorities aligned? Have firms decided that information privacy investments can enhance information security? What privacy functions are valuable in mitigating a data breach?
This infographic, which draws from the How IT and Infosec Value Privacy Report, examines how IT and privacy teams work in concert, so that their respective spends can complement one another.

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.
Tags: