Mapping and Securing Data Flows Across Your Ecosystem

Logo
Presented by

Jeannie Warner, Security Manager, WhiteHat Security and Kurt Risley, Security Architect

About this talk

GDPR is coming and anyone doing business with the EU will need a Data Officer to determine their data strategy. With a third of all attacks coming in against web applications, mapping the data flows through those applications is required to satisfy due diligence in securing your customer data, EU citizen data, and is a good exercise in general to protect your own intellectual property. In this talk, Jeannie Warner, Security Manager and Kurt Risley, Security Architect at WhiteHat Security will offer best application security practices for data in the following categories: - Data Classification - how secure does it need to be? - Data Categorization - which regulations will apply? - Data Rules - what kinds of repeatable policies should be applied? - Data Mapping - identify the flow from database to applications to client apps via APIs - Data Securing - showing the best practices for securing the applications by use cases

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (63)
Subscribers (19848)
WhiteHat™ DAST is a software-as-a-service (SaaS) dynamic application security testing (DAST) solution that allows your business to quickly deploy a scalable web security program. No matter how many websites you have or how often they change, WhiteHat DAST can scale to meet any demand. Synopsys acquired White Hat Security (NTT Application Security) in June of 2022.