Why Enterprises Are Shifting To Data-Centric Security To Safeguard Remote Access

Logo
Presented by

Bryan Kiss, Liz Wagoner, Lucky Effendi, Eugenus, Eddie Galang, Varundeep Kaur & Marcel Vieyra

About this talk

With data breaches on the rise, organizations are having to rapidly adapt and reconsider the way they share data with third parties. 44% of organizations have experienced a breach within the last 12 months, with 74% saying it was the result of giving too much privileged access to third-parties (Ponemon). Working with third parties is almost unavoidable, yet 51% of respondents to the Ponemon survey say their organizations are not assessing the security and privacy practices of all third-parties before granting them access to sensitive and confidential information. Join this session to hear from security leaders across a range of industries, including healthcare, food processing and fintech, as they discuss how they have secured their third party access and collaboration. Key takeaways from this session include: ● Why organizations across all industries need to secure their third party data ● Why organizations need to classify data and implement controls to protect it, including storage, archiving and destruction ● Why any data security solution needs to be easy for end users to use and adapt to This session is presented by Bryan Kiss (CFO / CCO), Kettle Hill, Liz Wagoner (Director, Data Protection), ADM, Lucky Effendi (Director, Information Technology), Eugenus, Eddie Galang (CISO), Port of Long Beach, Varundeep Kaur (CIO), Spice Money & Marcel Vieyra (CTO), Rapid Care Group.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (17)
Subscribers (1174)
50% of the organizations have experienced a data breach caused by third parties that led to the misuse of sensitive or confidential information (Ponemon) 65% have not even identified the third parties with access to the most sensitive data (SecurityMagazine) 24% of enterprises experienced a data breach because of a cyberattack incurred by a supplier (Kaspersky) These statistics prove, once again, that the weakest link in the chain is the extended value chain around the enterprise. Critical data like Intellectual Property (IP), PII, audit, and financial data are the crown jewels of an organization and are most susceptible to a data breach. Enterprise security teams lack control and visibility into the level of access to sensitive information for external users. So, how do you ensure that your sensitive data stays protected throughout the third-party collaboration cycle and beyond? Join this Summit to learn more about: • Current challenges when it comes to sharing data externally with third parties • Why data security is critical for external collaboration • How enterprises are strengthening their security postures across Cloud and third-party systems