A Mandate to Execute a New Data Security Strategy

 

In reality, we need to operate on data & control it once it leaves the enterprise.

BRENT WILLIAMS
Former CTO for Identity Solutions, Equifax
President & CEO, Euclidian Trust

HARPREET TOOR
Security Technologist, Accenture

Ionic sat down with two security visionaries to discuss the age of rapidly increasing digital theft and how practitioners should redesign defenses.  Considering this past year’s Equifax breach alone—both the consumers’ loss in trust and the impact to the company’s executive division– it’s clear that new security paradigms must emerge.

VIDEO PANEL OVERVIEW

Get actionable advice for implementing a data-centric approach to security, dynamic policy control, and visibility

Look at GDPR impacts through a unique lens to reveal business opportunities

Gain key industry insights on an all-encompassing data protection strategy

Contact us to learn more.

PLAYLIST HIGHLIGHTS

Typical protective controls still leave you at risk of losing data
Rethinking Security: A Data-Centric Approach
PLAY CLIP
Encrypting data only at rest & in motion isn't enough to eliminate risk
Common oversights that cause companies to misstate risk
PLAY CLIP
Security is equally valuable to business as Finance or HR
Data-centric security can improve data visibility, protect your business, & reduce compliance burdens
PLAY CLIP
Use Role-Based & Attribute-Based Access Control over critical data
Implementing data-centric security
PLAY CLIP
As data security requirements increase, integrators recommend moving away from apps and services without APIs
Securing data in a multi-vendor environment
PLAY CLIP
Securing the data itself, with fine-grained policies, are new capabilities - so expect some hesitation
The keys to successfully implementing data security
PLAY CLIP
Regulations like GDPR mandate fine-grained data access controls by country
The intersection of regulatory mandates & data security
PLAY CLIP
Today's policies must support complex data ownership & consent requirements
The value of data policy & telemetry when securing data
PLAY CLIP
DLP is inadequate for GDPR auditability
Why it's time to rethink DLP

How well do commonly-deployed technologies address GDPR's data protection requirements?

PLAY CLIP
Look for ISV’s with ecosystem-friendly integrations; stand-alone features are no longer enough
Important criteria when selecting software vendors
PLAY CLIP
Data telemetry allows audit questions to be answered automatically
Automate audits & enhance security with data telemetry
PLAY CLIP
Attribute-based data governance policies determine who can access data
How does Ionic support today's complex governance & control requirements?
PLAY CLIP
Features should be enhanced when integrated with other products
How system integrators select data protection vendors to work with
PLAY CLIP
Implementing data protection can prevent outages that risk not just businesses, but lives
Final Thoughts: Harpreet (Harry) Toor
PLAY CLIP
Minimize complexity by implementing new solutions with data protection integrated from the ground up
Final Thoughts: Brent Williams
PLAY CLIP
Close ()