Manage Learn to apply best practices and optimize your operations.
This article is part of our Essential Guide: Managing information security amid new threats: A guide for CIOs

Quiz: Can your information security strategy cut it in the digital age?

How stalwart is your information security strategy, exactly? Can it handle today's particularly malicious variety of security threats? Take our quiz to find out.

CISOs are among the group of IT executives earning the heftiest paychecks right now, and security managers saw a marked increase in compensation this year as well, according to the results of TechTarget's 2014 IT Salary and Careers Survey. And perhaps rightly so, as respondents once again pointed to information security as a top-three project areas of focus.

As the demand for security expertise increases, never has it been more pressing for IT leaders to make sure their enterprise's security strategy is ready to face today's fierce breed of security challenges. Review some of our recent stories and take this quiz to see if your information security strategy is strong enough to handle today's digital curveballs.

Next Steps

Find out the security lessons Apple's iCloud leak offers. Then, learn how you can turn the risks associated with SaaS apps into a competitive boon. Finally, read how basics are vital to enforcing effective data protection policies.

This was last published in October 2014

Join the conversation


Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

How do you balance securing sensitive corporate data with respecting employees' privacy boundaries?
I think the container approach is the way to go here - tools like Samsung Knox separate corporate data from personal stuff. 
Ben is right. I answered this in another discussion question, but if you're going to allow BYOD, you must have a solution that can sandbox or container the various data so they don't meet and so each remains safe. It's 2015, you'd think we know how to do that by now.