The speaker(s)/presenter(s) of the session you are trying to access did not provide permission to record their presentation. Consequently, the video recording is not available.
Identity & Access Management
Education Level: Intermediate
4214 - Data Security Without Perimeters
Monday, September 25
11:00 AM - 12:00 PM
VP Security Architecture & Engineering
In today’s cloud, mobile and multi-device information technology world, traditional perimeter defenses are no longer sufficient for protecting sensitive corporate information. Security professionals are tasked with the seemingly impossible challenge of protecting sensitive data, wherever it resides. Files with sensitive information are constantly being shared, forwarded and copied, both internally and externally, using a variety of collaboration platforms. While solutions such as DLP and behavior analytics can be very helpful in detecting potential misuse of sensitive data, they are not silver-bullet solutions.
An overview of IRM technology, use cases and user acceptance
The application of encryption to data has long been a solution to ensure the confidentiality and integrity of data, but applying it to documents in a way that is acceptable to users has been a lingering challenge. Recently, information rights management (IRM) platforms have been evolving to provide more compelling solutions for encrypting sensitive data with minimal negative impact on users.
This session will provide an overview of how the speakers’ company implemented an IRM solution, and how this technology plays an important role in future strategy. Presenters will discuss:
The effectiveness of IRM in protecting data outside of the organization, even when transferred cloud and mobile environments•How an IRM solution compliments an existing security portfolio
The importance of data classification when considering an IRM solution
- Better understand the challenge of protecting sensitive information stored and transmitted in unstructured documents.
- Understand the options available for protecting unstructured documents with sensitive data.
- Be able to discuss and evaluate solutions for document protection that may be applicable for attendees' environments.