Identity & Access Management


Education Level: Intermediate

4214 - Data Security Without Perimeters

Monday, September 25
11:00 AM - 12:00 PM

In today’s cloud, mobile and multi-device information technology world, traditional perimeter defenses are no longer sufficient for protecting sensitive corporate information. Security professionals are tasked with the seemingly impossible challenge of protecting sensitive data, wherever it resides. Files with sensitive information are constantly being shared, forwarded and copied, both internally and externally, using a variety of collaboration platforms. While solutions such as DLP and behavior analytics can be very helpful in detecting potential misuse of sensitive data, they are not silver-bullet solutions.

The application of encryption to data has long been a solution to ensure the confidentiality and integrity of data, but applying it to documents in a way that is acceptable to users has been a lingering challenge. Recently, information rights management (IRM) platforms have been evolving to provide more compelling solutions for encrypting sensitive data with minimal negative impact on users.

This session will provide an overview of how the speakers’ company implemented an IRM solution, and how this technology plays an important role in future strategy. Presenters will discuss:

  • An overview of IRM technology, use cases and user acceptance
  • The effectiveness of IRM in protecting data outside of the organization, even when transferred cloud and mobile environments•
  • How an IRM solution compliments an existing security portfolio
  • The importance of data classification when considering an IRM solution

    Learning Objectives:

    • Better understand the challenge of protecting sensitive information stored and transmitted in unstructured documents.
    • Understand the options available for protecting unstructured documents with sensitive data.
    • Be able to discuss and evaluate solutions for document protection that may be applicable for attendees' environments.
  • Chris Miller

    VP Security Architecture & Engineering
    Capital Group

    Chris Miller is an IT security professional with more than15 years of industry experience. He spent the first 12 years of his career working for one of the largest consulting firms helping Fortune 500 companies plan, design and implement a wide range of security solutions. Chris currently serves as the VP of Security Architecture & Engineering for Capital Group in Irvine, CA.
    Chris served as member of the WS-I Basic Security Profile working group, and as the web services security advisor during his consulting tenure. His past presentations include the RSA conference, the Cloud Security Alliance Congress in 2013 and Cloud Security World in 2015.

    He has also designed and delivered a variety of identity management solutions for companies across the globe.


    Send Email for Chris Miller

    Nathan Mawby

    Security Architect
    Capital Group

    Nathan is a Security Architect at Capital Group, holds a BS in Computer Information Systems from Cal Poly Pomona, and retains the CISSP and CISA credentials. After eight years of IT risk and compliance roles at Big Four and financial services firms, most recently at Capital Group, Nathan is now responsible for providing security solutions design and assists in defining enterprise security strategy.


    Send Email for Nathan Mawby


    4214 - Data Security Without Perimeters


    Attendees who have favorited this

    Please enter your access key

    The asset you are trying to access is locked. Please enter your access key to unlock.

    Send Email for Data Security Without Perimeters