Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Ponemon Institute
Ojas Rege, vice president of Strategy for MobileIron, will explain how his company can help your agency develop its mobile strategy and manage its mobile devices.
April 22, 2014
Most IT managers are moving data to the cloud, but 40 percent of them believe doing that will weaken security of that data.
Costs from data breaches are down, according to a new study by Symantec and the Ponemon Institute. In 2011, the average cost of a data breach was $5.5 million dollars — a decrease of 24 percent from the previous year. Similarly, the cost per compromised record was $194 dollars per compromised record, CIO.com reports on the study's results.
New survey finds Postal Services keeps information secure
Companies are considering insurance as a way to reduce risk and protect themselves from data breaches or hacks. Dr. Larry Ponemon tells us more about it.
The rapid convergence of security technologies combined with growing concerns about individual privacy are creating a need to understand the purpose of identification and credentialing in your environment and the impact on the public. Financial institutions and commercial services are adopting high tech methods to protect consumer access to convenient online transaction systems. Governments have adopted electronic identity documents to facilitate fast and convenient border crossing including ePassports, enhanced driver's licenses, and RFID Passport cards. We are all aware of public space surveillance systems to reduce street crime in urban centers. Proposed identity credentials are to provide a trusted citizen identification solution for employment authorization including biometric verification. How will these identification systems foster trust and confidence by consumers that their personal information is secure and protected? Join us for a discussion with experts in the field of identification and credentialing to learn about how these innovations can meet security and consumer needs while managing the impact on privacy and civil liberties.
Learn more in today's cybersecurity update.
Ponemon Institute study details why.
Tags: technology , cybersecurity , Cybersecurity Update , Larry Poneman , management , pay and benefits , John Berry , OPM , National Security Council , CIO Council , CHCO Council , Partnership for Public Service , Cyber Workforce