Protecting What Matters: The Era of Fences is Over

Presented by

Jay Leek, VP of International Security, Equifax

About this talk

It was not too many years ago when companies thought they were secure by simply deploying a firewall or other network security related solutions. Then came other infrastructure related security solutions, followed by the application security related buzz. While all of these solutions are important and still needed today, they often miss target of what’s most important to an organization protecting the data, or intellectual property, itself. So the million dollar question is why haven’t most organizations implemented proper data-centric security solutions? In summary, implementing data-centric security solutions is no simple challenge and requires a very strong alignment with business process as well as an understanding of an information life cycle for all of the data being protected. Complex questions must be asked which most information security organizations and business units struggle to answer. Therefore, information security organizations must further align themselves with their business units and counterparts to integrate more seamlessly into business processes in order to effectively implement security throughout the data life cycle as a business enabler. This session will address these issues head-on, and it will be presented from the perspective of an enterprise security manager who has gained firsthand knowledge about the challenges of implementing data-centric security solutions, such as data loss prevention, enterprise rights management and digital watermarking, in a global organization. Attendees will be provided with solution concepts, practical experience and lessons learned from real-world experiences to help address their data-centric security challenges of today.

Related topics:

More from this channel

Upcoming talks (21)
On-demand talks (3501)
Subscribers (180305)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.