Tag

security governance

1 views collected around this technical thread.

Data Thinking Notes
Data Thinking Notes
Jun 12, 2024 · Information Security

How to Implement Data Classification and Grading for Robust Security

This article outlines the national‑standard‑based methodology for classifying and grading data, detailing industry‑specific processes, core and important data identification criteria, general data handling, and a privacy‑focused governance framework that enables organizations to protect sensitive information effectively.

data classificationdata gradingdata protection
0 likes · 13 min read
How to Implement Data Classification and Grading for Robust Security
Architects Research Society
Architects Research Society
Jun 10, 2023 · Information Security

Roles and Responsibilities of a Security Architecture Team

The article outlines the composition of a security architecture team, detailing the roles of security architect, information security architect, chief information security officer, and security analyst, along with their business and technical skills, organizational relationships, and key responsibilities in managing enterprise security.

CISORisk ManagementSecurity Analyst
0 likes · 13 min read
Roles and Responsibilities of a Security Architecture Team
Beike Product & Technology
Beike Product & Technology
Jul 20, 2021 · Information Security

Building an Enterprise Information Security Management System: Challenges, Role, and Implementation Strategies

This article shares practical experiences from building a zero‑to‑one information security management system for enterprises, outlining common security challenges, the role of such systems in risk governance, and detailed implementation approaches including security policies, penalty mechanisms, and management operations to achieve closed‑loop risk mitigation.

Enterprise SecurityRisk Managementinformation security
0 likes · 10 min read
Building an Enterprise Information Security Management System: Challenges, Role, and Implementation Strategies
Architects Research Society
Architects Research Society
Apr 10, 2021 · Information Security

Unclear Responsibility and Growing Risks in IoT and Mobile Application Security

The article highlights the rapid expansion of IoT and mobile applications, the escalating security concerns, and the lack of clear ownership for protecting these platforms, citing survey data that shows widespread uncertainty and insufficient protective measures across enterprises.

IoT securityMobile Securityenterprise risk
0 likes · 5 min read
Unclear Responsibility and Growing Risks in IoT and Mobile Application Security
Efficient Ops
Efficient Ops
Jan 24, 2019 · Information Security

How Alibaba Scales Host Security Across Its Global Economic Ecosystem

This talk outlines Alibaba’s massive global host infrastructure, the evolving security governance from manual controls to data‑driven, automated systems, the challenges of compliance and operational efficiency, and future directions such as zero‑trust and invisible security.

compliancehost securityinformation security
0 likes · 16 min read
How Alibaba Scales Host Security Across Its Global Economic Ecosystem