Data Loss Prevention Best Practice - Applying User-driven Data Classification
- LANGUAGE: English DATE: Tuesday, June 07, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
The first step in protecting intellectual property and sensitive information is to classify it. This can be accomplished manually via author classification or automatically via content filtering. Some tools simplify the process and provide greater governance.
Putting data classification at the heart of an organization empowers all employees to be part of the security team. It provides them with the tools to take ownership for data protection. In turn this intensifies data security awareness, increases user trust and reduces the risk of valued and sensitive information ending up in the wrong hands. Especially with Payment Card Industry (PCI) compliance increasingly important for on-line businesses, and the new General Data Protection Regulation (GDPR) coming into effect in Europe, classification of sensitive documentation is paramount.
In this KuppingerCole webinar we will discuss:
- Drivers to implement data classification and where it helps how;
- The pros and cons of different mechanisms for classification such as user-applied classification, automated classification and policy-based classification;
- The importance of increasing user awareness;
- How to overcome executive challenges with data classification;
- Selecting the best data classification approach – getting the perfect blend;
- Examples of organisations who have successful implemented data classification.
In the first part of this webinar Graham Williamson, Senior Analyst at KuppingerCole, will explain the current state of the industry, the various options in secure data sharing and the importance of establishing a properly designed classification scheme.
Paul Johnson, EMEA Sales Director at Boldon James will then explain how the Classifier product provides a comprehensive solution to the classification task. He will also explain the best way to build awareness and instil staff interest in protecting the organisation’s documents and files.
There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.