- CISO Series Newsletter
- Posts
- 11-19-20 - Join us tomorrow for "Hacking Data Protection and Visibility"
11-19-20 - Join us tomorrow for "Hacking Data Protection and Visibility"
Join us tomorrow for "Hacking Data Protection and Visibility"
TOMORROW! Friday [11-20-20] We're "Hacking Data Protection and Visibility"
Please join us TOMORROW on Friday, November 13th, 2020 at 10 AM PT/1 PM ET for “Hacking Data Protection and Visibility: An hour of critical thinking on how to gain back control of your data wherever it travels”.I'll be leading this discussion with David Tyburski, CISO, Wynn Resorts and Elliot Lewis, CEO, Keyavi Data.REGISTER.
STICK AROUND FOR THE CYBERSECURITY SPEED DATING!
Immediately after the video chat (11:00 AM PT/2:00 PM ET) we'll rollover to our meetup where we'll match everyone who shows up with another cybersecurity professional. And we'll do it five times in less than 30 minutes.
Thanks to our sponsor Keyavi Data
This week's episode of Defense in Depth
Data Protection and Visiblity
is hosted by me, David Spark, producer of CISO Series and Allan Alford. Our sponsored guest is Elliot Lewis, CEO, Keyavi Data. All three of us discussed:
In general, all of security is based on detecting threats and stopping threats. When those two fail, and they do, what's your recourse to protect your data?
What if when your data leaves your control either accidentally or through a malicious breach, you were still able to see your data wherever it went and your data could communicate back to you its status, allowing you to control access to your data?
There are so many scenarios when data leaves you, it's impossible to protect for all scenarios.
Asset inventory is first step in the CIS 20. Just trying to get an asset inventory of equipment is difficult. An inventory of data is near impossible especially when you may be pumping out a terabyte of data a day.
Ideal situation is to protect data proactively, as it's being created.
The ultimate goal is to have visibility of your data in perpetuity, for the life of the data, and you can decide when to destroy it even when it's no longer within the confines of your greater network and ecosystem.
Governing your network, your applications, the rules, and the data is half the battle.
Data visibility also allows you to make informed decisions as a business and can provide the answers your legal team will need in case there's a breach.
You want the data protection and visibility schema to be platform and ecosystem independent. If data is taken out of the ecosystem, then the protection and visibility is moot.
A good precursor to this is digital rights management or DRM. They have figured out how to manage data from being copied and manipulated and they can place controls on it. The limiting factor though is it's platform dependent.
Special thanks to this week's podcast sponsor, Keyavi Data.
Our Keyavi breaks new ground by making data itself intelligent and self-aware, so that it stays under its owner’s control and protects itself immediately, no matter where it is or who is attempting access. Keyavi is led by a team of renowned data security, encryption, and cyber forensics experts. See for yourself at
.
Cyber Security Headlines
This week's sponsor of
Cyber Security Headlines
is Dtex.
Best Moments from "Hacking Multi-Factor Authentication"
Here's a 6 1/2 minute highlights reel of last Friday's CISO Series Video Chat “Hacking Multi-Factor Authentication: An hour of critical thinking on best technologies, implementations, and adoptions of MFA”.Joining me in this discussion were Taylor Lehmann, CISO, board member, H-ISAC and Bojan Simic, CTO and co-founder, HYPR.Check out the blog post to watch the video, read the "Best Bad Ideas" and the best quotes from the chat room, and to get access to the full one-hour recording.
Huge thanks to our sponsor, HYPR.
Subscribe to all our podcasts
Click any of the podcasts below to get access to the subscription feeds. If you're already a subscriber, thank you!