source : https://www.google.com.pk/search?hl=en&site=imghp&tbm=isch&source=hp&biw=1366&bih=599&q=security+%26+customer+data+management&oq=security+%26+customer+data+management&gs_l=img.12…1585.1585.0.2520.1.1.0.0.0.0.236.236.2-1.1.0.msedr…0…1ac.1.64.img..1.0.0.mevj0lz9ccy#hl=en&tbm=isch&q=securing+your+most+precious+resource+-+data&imgrc=mjyqm_o7bd58km%253a%3b7vubpmfuvje3jm%3bhttp%253a%252f%252fwww.electricabacus.co.uk%252fimages%252fbody%252fsecuritytext.jpg%3bhttp%253a%252f%252fwww.electricabacus.co.uk%252f%3b250%3b400
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.