Essential Guide

This Essential Guide is a collection of articles, videos and other content selected by our editors to give you a comprehensive view of this topic.

Protect information like a pro: A guide for enterprise CIOs

Providing adequate protection for corporate data is a top-of-mind concern across IT. In this CIO essential guide, learn how to protect information assets in your organization.

CIOs charged with protecting information in their organizations must not only implement reliable backup processes but also combat unexpected failures and threats such as application and user error, cyberattacks and facility outages or disruptions. Many CIOs also find that data protection management calls for establishing a system for valuing and cataloging data to determine the importance of various assets.

Suffice it to say, protecting information in the corporate sphere from corruption, leakage and other threats remains a top priority. In this guide, learn how to safeguard data on mobile devices, enact appropriate information protection governance standards and stay on top of the latest data threats.

This CIO essential guide on how to protect information is part of the CIO Briefings series, which is designed to give IT leaders strategic management and decision-making advice on timely topics.

Mobile and cloud data

1. Data protection in a mad, mobile world

What should be on your 2014 IT trend watch when it comes to protecting information? Many CIOs and IT leaders are zeroing in on cloud and mobile, which necessitate a focus on securing data wherever it lives. In these pieces, CIOs and IT experts explain the best methods for protecting information on corporate devices or in the cloud.

  • Data protection management for all things mobile

    SearchCIO's mobility-themed tweet jam this year touched on one of mobility's biggest issues: how to create a data protection management plan to ensure that information on mobile devices stays safe. Application development, cloud computing and bring your own device (BYOD) pose constantly evolving threats to data stored on mobile devices; our participants offer some remedies.

    MORE MOBILE DEVICE MANAGEMENT AND BYOD

  • Podcast: Securing mobile endpoints and managing mobile data

    Mobility isn't just a lifestyle -- it's a work-style. Jack Gold, president and principal analyst at J. Gold Associates LLC, suggests that companies that don't support a mobile workforce are putting themselves at a competitive disadvantage. In this podcast, Gold discusses where CIOs should focus their efforts in terms of tools that help manage mobile devices, then answers the questions, "Is it really managing mobile devices, or is it more managing applications and data?"

    READ ABOUT MOBILE DEVICE MANAGEMENT SOFTWARE

  • Data crunching made easy for cancer researchers

    In Nicole Laskowski's Data Mill column, the SearchCIO senior news writer delves into the University of Chicago's big data analytics infrastructure crafted for its cancer-research building. Learn how Robert Grossman, chief research informatics officer and professor of biological sciences, solved his department's data crunching dilemma with a community cloud.

    WHAT IS A COMMUNITY CLOUD?

  • Best approaches to mobile device and data protection

    Are you walking the mobile tightrope, aiming to balance the obvious benefits with the inherent risks? John Pescatore, a vice president and analyst at Stamford, Conn.-based consultancy Gartner Inc., offers up his four-point take on the best approaches to crafting a mobile information protection plan.

    MORE ON REDUCING MOBILE RISKS

  • BYOD security stymies CIOs, budgets not keeping pace

    The 34th annual SIM IT Trends Study asked CIOs and senior IT executives to pick their three areas of greatest concern. BYOD was the fifth-highest concern, yet respondents listed BYOD as just the 21st largest IT investment in their organizations. By failing to protect information transmitted via mobile devices, organizations are putting their livelihood at risk.

    BALANCE THE RISKS AND REWARDS OF BYOD

Videos

2. Information protection and security

To protect information properly, CIOs must stay on their toes when it comes to developments in the data sphere. The videos in this section examine current trends in protecting information, addressing frequent data privacy and security problems faced by enterprise IT departments.

Data governance

3. Information strategy with a data protection slant

A large component of data protection is information governance. Equally important is building a holistic approach to data management that enlists certain processes, controls and metrics in order to treat information as the valuable business asset it is. In the following tips and feature stories, learn how IT leaders are managing, storing, processing and protecting their information while relying on different governance strategies.

  • Five steps to privacy and data protection governance

    Does your IT department have a handle on your company's data privacy scope? Does everyone understand his or her role and responsibilities when it comes to data protection? In this tip from Jinan Budge, global council manager for Forrester Research's Security & Risk Council, and Heidi Shey, a Forrester analyst, learn their five tips for better data governance and protection.

    LEARN ABOUT DATA MANAGEMENT POLICIES

  • Governing BYOD: The data governance and security effect

    For better or worse, BYOD is here to stay. So how can CIOs and compliance officers contend with information governance and security concerns? Strong BYOD policies and an effective governance structure are necessary in order to keep information accessible but also safe.

    PUT BYOD RISKS IN THEIR PLACE

  • Data quality analysis and big data governance bring value to biz

    In this SearchCompliance Q&A, Stuart Brown, a senior consultant and data and information governance lead at RXP Services Ltd., discusses the wealth of opportunity that lies in data quality analysis and big data governance. Read up to discover what quality data means to your organization and how governance can maximize value and seamless process integration.

    READ A BUSINESS CASE FOR INFO GOVERNANCE MANAGEMENT

  • When project governance is severely lacking

    In light of the recent finger pointing in Washington over the rollout of the Affordable Care Act website, Michael Schrage, a research fellow at the MIT Sloan School of Management's Center for Digital Business, said, "Successful IT systems demand serious IT governance. Where was it?" SearchCIO's Karen Goulart points readers toward Schrage's blog post and highlights another reason governance is key when dealing with engaged customers, privacy regulations and massive quantities of data.

    MINIMIZE DELAYS WITH PROJECT GOVERNANCE

  • Governance drives big data advantage at Penn Medicine

    Michael Restuccia and Brian Wells, IT leaders at Penn Medicine, turned to governance to solve some big data problems. Their unusual, top-down governance structure at the University of Pennsylvania put the medical center on the map in big data, data mining and high-performance computing. Read more about this CIO team's breakthrough work and the big data advantages they've reaped through good governance.

    MORE ON IT AT PENN MEDICINE

Glossary

4. Data protection terms to know

Before investing in data protection tools and services, make sure you understand some of the terminology.

Information protection trends

5. Top data threats in the enterprise

Are you managing information protection on a broad scale? This section showcases some of the latest stories on information protection produced on SearchCIO and our sister sites. Click on the links below and find out what information IT leaders are looking to protect and how they're assigning organizational resources accordingly.

Quiz

6. Information protection quiz for data-minded CIOs

It's been said time and time again: Security measures are more vital than ever as sensitive data is increasingly targeted by nefarious sources. Protecting information will remain a top concern for the CIO, but many solutions continue to carry a hefty price tag. With so much sensitive data at risk and so many IT security bases to cover, it can't hurt to see where your organization stands. Take this quiz on information protection to gauge your organization's level of preparedness.

TEST YOUR DATA DEFENSE IQ