2 Questions to Drive Your Data Protection Strategy Understand the What and Where to guide your program
Bill Bradley Bio Prior Experience: Cybersecurity, Physical Bill Bradley Security; Marketing, Sales, and Business Director, Product Marketing Leadership Marketing and Sales Professional Product Marketing for Data Loss Prevention ~20 years of technical marketing & sales experience • Field Sales, Competitive Analysis, Product Mktg & Mgt Previously at Rapid7 and General Electric Corporation 2
Agenda The Trend Toward Data Question #1 - Data Protection Objectives Question #2 - Data Protection Vision Linking What with Where Questions
The World & Business Runs on Data Facebook users upload 900mm photos…daily INTANGIBLE ASSETS (SUCH AS IP) HAVE GROWN FROM 17% OF THE S&P 500’S MARKET VALUE IN 1975 TO 84% IN 2015 IDC estimates that the digital universe is growing at ~40% year over year. Sources: Ocean Tomo, Annual Study of Intangible Asset Market Value; http://datacenterfrontier.com/inside-facebooks-blu-ray-cold-storage-data-center/ ; IDC 4
Business Runs on Data
Question #1 - Data Protection Objectives
Question #1 - Data Protection Objectives What is your primary data protection objective?
Question #1 - Data Protection Objectives Comply with External Regulations Protect Intellectual Property Comply with Business Partner 8
Comply with Regulations “Protect all EU citizens from privacy and data “Maintaining payment security is required for all entities breaches in an increasingly data-driven world” that store, process or transmit cardholder data” “Protecting the privacy and security What is your corporate language of certain health information.” around data governance? “Explain their information-sharing practices to their customers and to safeguard sensitive data” 9
Protect Intellectual Property CAD SW Source Code Drug Development Process DRUG Drug Discovery & DISCOVERY Development-Timeline PRECLINICAL CLINICAL TRIALS FDA REVIEW 1 FDA 10,000 250 5 COMPOUNDS APPROVED COMPOUNDS COMPOUNDS DRUG ~6.5 YEARS ~7 YEARS ~1.5 YEARS 10
Comply with Business Partner Single Corporate HQ Regional Manufacturing Global design centers Local Retailers Global innovation centers 11
Question #2: Data Protection Vision
Question #2: Data Protection Vision Where do you need to focus your data protection efforts?
Question #2: Data Protection Vision OUTSIDER THREATS INSIDER THREATS 14
Linking the “What” with the “Where” 15
Linking the What with the Where COMPLY WITH REGULATIONS PROTECT INTELLECTUAL PROPERTY COMPLY WITH BUSINESS PARTNER 16
Linking the What with the Where COMPLY WITH REGULATIONS PROTECT INTELLECTUAL PROPERTY COMPLY WITH BUSINESS PARTNER 17
Linking the What with the Where COMPLY WITH REGULATIONS PROTECT INTELLECTUAL PROPERTY OUTSIDER THREATS COMPLY WITH BUSINESS PARTNER INSIDER THREATS 18
Linking the What with the Where PROTECT INTELLECTUAL PROPERTY ENDPOINT DLP COMPLY WITH BUSINESS PARTNER 19
Linking the What with the Where ENDPOINT DLP PROTECT INTELLECTUAL PROPERTY COMPLY WITH BUSINESS PARTNER + OUTSIDER THREATS + INSIDER THREATS ADVANCED THREAT PROTECTION 20
Linking the What with the Where NETWORK DLP CLOUD DLP COMPLY WITH REGULATIONS DISCOVERY DLP 21
Summary Data is fueling business; you need to protect it Two questions can guide your data protection program • What is your primary data protection objective? • Where do you need to focus your data protection efforts? The answers can provide direction for your data protection • Network, Endpoint, Cloud, and Discovery • Advanced Threat Protection 22
Next Generation Data Protection 23
Data is Everywhere 24
Data Protection is Everywhere
Questions? 26
Digital Guardian’s Next Webinar 451 Research - Data Classification for Better Data Protection You can’t protect what you don’t understand • Thursday, August 25, 2016 @ 11:00 AM ET • Garrett Bekker - Senior Security Analyst - 451 Research • William Bradley - Product Marketing - Digital Guardian Watch this webcast to learn: • How the data intensive organization is expanding and the impact • Why trying to protect everything is a recipe for disaster (or very expensive!) • How data classification can drive more efficient and effective data security • The types of classification and how to evaluate them 27
Recommend
More recommend