Why Highly Regulated Industries Need Secured Third Party Collaborations

Presented by

Rob Oden, L3 Harris Technologies, Monil Naicker, Applied Materials, Evgeniy Kharam, Herjavec Group & Vishal Gauri, Seclore

About this talk

While all organizations need to turn their thoughts to data security to adjust to the increase in data breaches, the need is even more pressing for those in highly regulated industries like healthcare, financial services and energy, who must juggle the need to collaborate with increasing regulations. It’s evident that for enterprises in some highly regulated industries, data breaches can be more costly than for those outside, with IBM finding in their 2021 Cost of a Data Breach report that the three industries with the highest costs of a breach are all highly regulated: Healthcare, Financial and Pharmaceuticals. Hear from IT leaders across a range of industries, including healthcare, aerospace engineering, defense technology and materials engineering about how they navigate the regulatory landscape while enabling secure third-party collaboration. Join this session to learn: ● How to manage regulations across multiple geographies and how rights management software like Seclore can make this easier ● Balancing secure communications across suppliers, clients and partners ● Building digital rights management into your systems as a native experience This session is presented by Rob Oden (Senior Manager Data Protection and Investigations), L3 Harris Technologies, Monil Naicker (Director of Identity and Access Management), Applied Materials, Evgeniy Kharam (VP, Solution Architecture), Herjavec Group & Vishal Gauri (President – Americas), Seclore.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (16)
Subscribers (1225)
50% of the organizations have experienced a data breach caused by third parties that led to the misuse of sensitive or confidential information (Ponemon) 65% have not even identified the third parties with access to the most sensitive data (SecurityMagazine) 24% of enterprises experienced a data breach because of a cyberattack incurred by a supplier (Kaspersky) These statistics prove, once again, that the weakest link in the chain is the extended value chain around the enterprise. Critical data like Intellectual Property (IP), PII, audit, and financial data are the crown jewels of an organization and are most susceptible to a data breach. Enterprise security teams lack control and visibility into the level of access to sensitive information for external users. So, how do you ensure that your sensitive data stays protected throughout the third-party collaboration cycle and beyond? Join this Summit to learn more about: • Current challenges when it comes to sharing data externally with third parties • Why data security is critical for external collaboration • How enterprises are strengthening their security postures across Cloud and third-party systems