5 Steps to Protect Your Data from Internal & External Threats

  • LANGUAGE: English DATE: Thursday, September 11, 2014 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Upcoming Webinars

Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and haven’t been willing to acknowledge it. Many are operating in specific regulatory environments, but aren’t in full compliance, leaving them vulnerable to lawsuits or even criminal prosecution.

Data is data is data. It doesn’t matter where it’s located – cloud or local – or its format – structured, unstructured, semistructured, but if you don’t know what it is, where it is, and who’s touching it, you cannot protect it.

As the organizational information is vast and ever-growing, protecting and managing the information should not be limited to IT or the security team; every employee should contribute. Electing data owners, and allowing employees to participate in data protection processes through a consumer-oriented interface relieves the overburdened IT departments from being responsible for protecting all the organizational data. Involving the employees in such efforts will help raising their awareness about information security and educate them about data protection.

In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will discuss the evolution of Access Governance and Access Intelligence. What is needed to completely capture the access risks? Here, the concept of "Entitlements & Access Governance“ (EAG) is playing an important role, which has been introduced recently by KuppingerCole. Another aspect Martin Kuppinger will cover is the question where real-time-analysis really is required and what else needs to be considered – particularly from an organizational layer – to implement really effective Access Governance.

In the second part of this webinar, Roy Peretz, Vice President of Product Management at Whitebox Security, is going to discuss in greater detail the five steps you need to take to protect your data:

  1. Find where your sensitive data resides
  2. Achieve visibility into who can and has accessed data 
  3. Set access policies, compliance controls, and Segregation of Duties policy in place
  4. Automate Access Requests, Perform Access Reviews, and Eliminate Stale Objects
  5. Delegate authority, and educate everyone about data protection

Platinum Sponsors

Speakers

Roy Peretz is responsible for Whitebox Security's product management, product marketing and overall product strategy. Roy brings over 12 years of experience in technology, marketing and business strategy to this role. Mr. Peretz gained significant experience serving in various information...


Platinum Sponsor

Whitebox Security is a leader in the field of Identity and Access Governance. The company pioneered Intelligent Access Governance, which combines the best of identity intelligence, and identity & access governance in WhiteOPS™, its Access Governance solution.

Watch now

Downloads

Trending Videos

Next Webinar

Webinar

Making Zero Trust a Reality: Basing Decisions on Valid Identity Data

Cloud computing and mobile workforces have resulted in an expanding attack surface and a complex web of identify information. This means that traditional perimeter-based security models are no longer effective. A Zero Trust model of strict access control for every user and device enables businesses to be connected and secure, but an effective identity-focused approach is essential.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00