Mapping and Securing Data Flows Across Your Ecosystem

Logo
Presented by

Jeannie Warner, Security Manager, WhiteHat Security and Kurt Risley, Security Architect

About this talk

GDPR is coming and anyone doing business with the EU will need a Data Officer to determine their data strategy. With a third of all attacks coming in against web applications, mapping the data flows through those applications is required to satisfy due diligence in securing your customer data, EU citizen data, and is a good exercise in general to protect your own intellectual property. In this talk, Jeannie Warner, Security Manager and Kurt Risley, Security Architect at WhiteHat Security will offer best application security practices for data in the following categories: - Data Classification - how secure does it need to be? - Data Categorization - which regulations will apply? - Data Rules - what kinds of repeatable policies should be applied? - Data Mapping - identify the flow from database to applications to client apps via APIs - Data Securing - showing the best practices for securing the applications by use cases

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (58)
Subscribers (19717)
NTT Application Security is driving the future of application security. For nearly 20 years, organizations around the globe have relied on NTT Application Security to secure their business’ digital footprint in an increasingly application-driven world. Bolstered by its award-winning, cloud-based application security testing platform, NTT Application Security delivers industry-leading accuracy by combining artificial and human intelligence to help security teams quickly identify and remediate potential vulnerabilities. Formerly WhiteHat Security, the company is an independent, wholly-owned subsidiary of NTT Ltd. and is part of NTT’s security services portfolio. NTT Application Security is headquartered in San Jose, Calif., with regional offices in Houston and Belfast. For more information, visit www.whitehatsec.com.