5 Steps to Protect Your Data from Internal & External Threats
- LANGUAGE: English DATE: Thursday, September 11, 2014 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and haven’t been willing to acknowledge it. Many are operating in specific regulatory environments, but aren’t in full compliance, leaving them vulnerable to lawsuits or even criminal prosecution.
Data is data is data. It doesn’t matter where it’s located – cloud or local – or its format – structured, unstructured, semistructured, but if you don’t know what it is, where it is, and who’s touching it, you cannot protect it.
As the organizational information is vast and ever-growing, protecting and managing the information should not be limited to IT or the security team; every employee should contribute. Electing data owners, and allowing employees to participate in data protection processes through a consumer-oriented interface relieves the overburdened IT departments from being responsible for protecting all the organizational data. Involving the employees in such efforts will help raising their awareness about information security and educate them about data protection.
In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will discuss the evolution of Access Governance and Access Intelligence. What is needed to completely capture the access risks? Here, the concept of "Entitlements & Access Governance“ (EAG) is playing an important role, which has been introduced recently by KuppingerCole. Another aspect Martin Kuppinger will cover is the question where real-time-analysis really is required and what else needs to be considered – particularly from an organizational layer – to implement really effective Access Governance.
In the second part of this webinar, Roy Peretz, Vice President of Product Management at Whitebox Security, is going to discuss in greater detail the five steps you need to take to protect your data:
- Find where your sensitive data resides
- Achieve visibility into who can and has accessed data
- Set access policies, compliance controls, and Segregation of Duties policy in place
- Automate Access Requests, Perform Access Reviews, and Eliminate Stale Objects
- Delegate authority, and educate everyone about data protection
Whitebox Security is a leader in the field of Identity and Access Governance. The company pioneered Intelligent Access Governance, which combines the best of identity intelligence, and identity & access governance in WhiteOPS™, its Access Governance solution.
Effective Identity Governance and Administration (IGA) is becoming increasingly important as digital transformation, cloud computing, and remote working increase the scope and complexity of Identity and Access Management (IAM) to new levels. But legacy role-based access control (RBAC) solutions alone are unable to meet the changing and dynamic IGA requirements of modern enterprises.