Learn How to Align Data Security Spending with Product Line Value

Verdasys and Forrester Research's Ed Ferrara to Host Live Webinar: a Value- Based Approach to Protecting Sensitive Data Featuring a New Innovative Security Budgeting Model

  • Share on TwitterShare on FacebookShare on Google+Share on LinkedInEmail a friend
... we must focus our security investments on the value of the assets most critical to the company.

Waltham, Mass. (PRWEB) April 23, 2013

A new approach to data security budgeting that creates better alignment between spending and the value of critical products and services is the subject of a live webinar hosted by guest speaker Ed Ferrara, Principal Analyst Serving Security and Risk Professionals, Forrester Research, Inc., and Bill Munroe, Vice President of Marketing at Verdasys. Based on a recent survey conducted by Forrester Consulting for Verdasys, the webinar is titled "Survey Finds Existing Security Planning and Budgeting Incomplete" and will be held Wed., April 24, 2013, at 10:00 am ET. Register at
http://www2.verdasys.com/survey-webinar-media-alert.

Verdasys and Forrester will present a newly-developed security spending model that represents a fundamental departure from traditional approaches which allocate spending evenly across all revenue generating products and services, rather than on the organizations most valuable assets. The new model allows security teams and lines of business to work together to align expenditures with the business value of the data they are protecting and the most important corporate revenue streams. Attendees will receive a free copy of the new security value model.

"Currently security investments are spread like peanut butter across all systems
and data they are trying to protect, with spending calculated based on 'what was done last year,' " said Verdasys' Munroe. "With changing business models and increasing threats faced by valuable assets, we must focus our security investments on the value of the assets most critical to the company."
Attendees will learn how to effectively budget for security solutions, including:

  •     The error a majority of firms make when calculating security costs and why this model must change
  •     Why the relationship between information security cost and IP value is critical
  •     How to utilize the relationship between IP asset and security investment to more effectively plan, spend and defend sensitive data
  •     How data classification plays a critical role in understanding the risks to sensitive data and building an effective risk mitigation investment plan
  •     How a platform and unified policy approach to data protection is superior in efficacy and costs savings

WHO SHOULD ATTEND:

  •     Public and private sector CIOs, CISOs, IT - Enterprise Architects, Experts in Legal, Risk/Compliance and LOB/General Managers

WHEN: Wed., April 24, 2013, at 10:00 am ET. To register: http://www2.verdasys.com/survey-webinar-media-alert

About Verdasys
Verdasys (http://verdasys.com) provides Enterprise Information Protection solutions and managed services to secure sensitive data and assure the integrity of business processes, enabling midsize and global businesses to successfully compete in collaborative and mobile environments. Digital Guardian, a Leader in Gartner’s Magic Quadrant for Content-Aware Data Loss Prevention, is a proven technology platform that provides complete, policy-based data lifecycle monitoring, classification, control and forensics on endpoints and servers, virtual machines and enterprise applications, networks, mobile devices and cloud environments. Digital Guardian protects IP and regulated data from compromise by insiders, contractors, partners and targeted cyber attacks. Since 2003, millions of Digital Guardian agents have been deployed to protect critical data for global leaders in financial services, insurance, technology, manufacturing and healthcare industries.

Contact: Betsy Kosheff, 413-232-7057 (bkosheff@verdasys.com)


Contact

Follow us on: Contact's Facebook Contact's Twitter Contact's LinkedIn

Attachments

Forrester Technology Adoption Profile Forrester Technology Adoption Profile

IT Leaders Should Look At Economic Value To Drive Security Spending Decisions That Protect Valuable Information Assets