Date: Tuesday, April 8, 2014 ET
Time: 2:00 p.m ET / 11:00 a.m. PT
Your organization’s unstructured information is comprised of emails, documents, and other file types, and is saved to computers, mobile devices, the cloud, everywhere. So how do you go about securing your most important data, optimizing information sharing, and reducing data loss if you don’t know what data you have and where it is?
Security has is too often focused on the system and devices, not the data. The question you need to answer is not just, “What are my employees doing with the data?” but also, “What could they do with the data?”.
Join Wendy Nather, Research Director, Enterprise Security Practice at 451 Research and Stephane Charbonneau, CTO at TITUS for a discussion on how analyzing, identifying & defining your data are key steps to effective data security. Learn how:
- “Data events” can impact data security requirements
- The future of information governance in a data-driven society
- The regulatory compliance benefits of embedding data classification processes within a data-centric security model (HIPPA, PCI, FERPA, PII)
- To enhance integration between identity management and data classification
-Wendy Nather, Research Director, Security, 451 Research
–Stephane Charbonneau, Founder, CTO and VP of Product Development, TITUS