Realign your data protection strategy efforts

Realign your data protection strategy efforts

Date: Nov 03, 2010

Attackers go to great lengths to infiltrate organizations and go well beyond technically savvy hacks to worm through networks and systems to steal identity information and ultimately intellectual property. 

This webcast will break down a modern attack and explain what attackers target and how they execute attacks, all in the context of your need to reassess and re-prioritize risk. You’ll learn what you need to do to realign your data protection strategy efforts to counter new threats by first understanding what’s important to your business, and then developing a strategy that helps you break the chain of events in an attack and stop them before it gets too deep inside your company.

About the expert:
David Sherry is CISO of Brown University.

More on Enterprise Data Governance

  • canderson

    PCI analysis: Marcus Ranum on why PCI DSS sets the bar too low

    VIDEO - Tenable CSO Marcus Ranum says Target-like breaches occurred even with PCI compliance because PCI established only a minimal set of requirements.
  • canderson

    File access logs: Marcus Ranum surprised by NSA shortfall

    VIDEO - Tenable CSO Marcus Ranum says he's surprised at how little information the NSA seems to have about which documents were stolen by Edward Snowden.
  • canderson

    Log management and analysis: How, when and why

    VIDEO - In this presentation, John Burke discusses how to make the most of logs to augment an organization’s overall security posture.
  • Bitcoin exchanges maturing, but Bitcoin security still a concern

    News - The Bitcoin market is maturing but security issues, such as private key management, persist. The Bitcoin Foundation gives the good news and bad news regarding Bitcoin security.

    ( Sep 19, 2014 )

  • document sanitization

    Definition - In addition to making sure the document text doesn’t openly divulge anything it shouldn’t, document sanitization includes removing document metadata that could pose a privacy or security risk.
  • metadata security

    Definition - Metadata is defined as “data about data.” It adds information to data that makes it possible to process it automatically and to effectively find, categorize, share and reuse it, among other things. However, metadata that is accessed by unauthorized parties can pose a significant risk to businesses.
  • sensitive information

    Definition - Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.
  • document metadata

    Definition - Document metadata is information attached to a text-based file that may not be visible on the face of the document; documents may also contain supporting elements such as graphic images, photographs, tables and charts, each of which can have its own metadata.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: