Computer Forensics and its Role in the Risk Management Process by IBMWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Research Abstract
Computer Forensics and its Role in the Risk Management Process
by IBM

> View this now

Published on: May 19, 2011
Type of content: EGUIDE
Format: Unknown
Length: 6 pages
Price: FREE


The possibility of a data breach is very real – no matter how proactive your security measures are. So, how can you effectively respond to security incidents to ensure a proper breach investigation?

Learn about computer forensics, a technology used to secure, collect and analyze digital evidence related to security incidents and data breaches.

Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies. Get answers to your compliance questions, including:

  • What’s the difference between computer security and computer forensics?

  • Is a formal forensics analysis needed for every suspected or known security breach?

  • How do I integrate computer forensics with my compliance programs?

> View Company Report
> View all content by this company
> Return to Search Results

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts