How to Conduct a Data Security Audit
In the world of ediscovery, securing data isn’t an option — it’s a fundamental necessity. With a thoughtful, methodical approach to evaluating data risks, you can design a security audit program that will pinpoint everywhere that your data is vulnerable. As you look at those risks, consider the vulnerabilities that can be introduced by your policies, people, infrastructure, applications, and partners.
This guide examines potential security risks and vulnerabilities, explains how to set up security audits that address those risks, and provides recommendations for evaluating your vendors as part of the process.
Other topics covered in this guide include:
- Ediscovery Points of Risk
- The Law Firm Dilemma
- Security Audits
- Evaluate Your Current Security Process
- Risk Reduction