5 Steps to Protect Your Data from Internal & External Threats
- LANGUAGE: English DATE: Thursday, September 11, 2014 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and haven’t been willing to acknowledge it. Many are operating in specific regulatory environments, but aren’t in full compliance, leaving them vulnerable to lawsuits or even criminal prosecution.
Data is data is data. It doesn’t matter where it’s located – cloud or local – or its format – structured, unstructured, semistructured, but if you don’t know what it is, where it is, and who’s touching it, you cannot protect it.
As the organizational information is vast and ever-growing, protecting and managing the information should not be limited to IT or the security team; every employee should contribute. Electing data owners, and allowing employees to participate in data protection processes through a consumer-oriented interface relieves the overburdened IT departments from being responsible for protecting all the organizational data. Involving the employees in such efforts will help raising their awareness about information security and educate them about data protection.
In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will discuss the evolution of Access Governance and Access Intelligence. What is needed to completely capture the access risks? Here, the concept of "Entitlements & Access Governance“ (EAG) is playing an important role, which has been introduced recently by KuppingerCole. Another aspect Martin Kuppinger will cover is the question where real-time-analysis really is required and what else needs to be considered – particularly from an organizational layer – to implement really effective Access Governance.
In the second part of this webinar, Roy Peretz, Vice President of Product Management at Whitebox Security, is going to discuss in greater detail the five steps you need to take to protect your data:
- Find where your sensitive data resides
- Achieve visibility into who can and has accessed data
- Set access policies, compliance controls, and Segregation of Duties policy in place
- Automate Access Requests, Perform Access Reviews, and Eliminate Stale Objects
- Delegate authority, and educate everyone about data protection
Whitebox Security is a leader in the field of Identity and Access Governance. The company pioneered Intelligent Access Governance, which combines the best of identity intelligence, and identity & access governance in WhiteOPS™, its Access Governance solution.
Unternehmen müssen in der modernen IT-Welt eine Vielzahl von Angestelltenidentitäten, Benutzerrollen, Zugangspunkten und Endgeräten verwalten. Diese Verwaltung von digitalen Identitäten und den entsprechenden Zugriffsrechten ist für die meisten Firmen nicht nur kompliziert, sondern auch zeitaufwändig. Wenn Unbefugte fälschlicherweise Zugriff zu sensiblen Unternehmens- und Kundendaten erhalten, kann dies zu Compliance-Problemen, Bußgeldern und Reputationsverlusten führen.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from September 13 - 16, 2021, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 1000 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.