Secured 3rd party collaboration…Why is it the need of the hour?

Presented by


About this talk

As organizations are increasingly collaborating with partners, there is a significant increase of sensitive information residing outside of said organization. Over time, these data repositories start building up and pose a substantial third-party risk for the organization. Organizations deriving strategic benefits from outsourcing work need to find a way to protect their sensitive information before it reaches the third party. 56% of organizations lack seriousness when it comes to third-party vendors & 65% of organizations have not identified the third parties with access to the most sensitive data. Some of the challenges of outsourcing include non-disclosure agreements which can only be enforced when a breach occurs, the difficulty in proving the theft or misuse of data and the accidental misuse of sensitive data. Seclore ensures that organizations can automatically attach persistent granular usage controls to emails and documents. With Seclore, organizations can safely grant external vendors restricted access to documents containing sensitive information, while retaining the ability to revoke access to the sensitive information after the project is complete. Join this session to learn: - Why DLP, Classification & Encryption aren't the solution to securing third party collaboration - Why you need visibility over how third parties use, store and destroy shared information - How Seclore can enable your organization to safely open the cloud to third parties - Why Seclore is the best option for securing your organization's sensitive data This unmissable, extended session includes a keynote from Todd Fennell, Vice President Information Security, American Express, covering why secure external collaboration using cloud is the future of banking, customer case studies exploring how enterprises like Rapid Care Group are strengthening their security postures by using Seclore and a peek into Seclore's product roadmap with Seclore CTO, Abhijit Tannu and much more.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (16)
Subscribers (1217)
50% of the organizations have experienced a data breach caused by third parties that led to the misuse of sensitive or confidential information (Ponemon) 65% have not even identified the third parties with access to the most sensitive data (SecurityMagazine) 24% of enterprises experienced a data breach because of a cyberattack incurred by a supplier (Kaspersky) These statistics prove, once again, that the weakest link in the chain is the extended value chain around the enterprise. Critical data like Intellectual Property (IP), PII, audit, and financial data are the crown jewels of an organization and are most susceptible to a data breach. Enterprise security teams lack control and visibility into the level of access to sensitive information for external users. So, how do you ensure that your sensitive data stays protected throughout the third-party collaboration cycle and beyond? Join this Summit to learn more about: • Current challenges when it comes to sharing data externally with third parties • Why data security is critical for external collaboration • How enterprises are strengthening their security postures across Cloud and third-party systems