Description
Gain an understanding of how your business can protect its data assets on premises and in the cloud.Because the work from home movement and migration to cloud architecture has dramatically altered and increased the threat surface of business data networks, corporate boards and their CISOs need to reevaluate their data network security policies, procedures and approach to meet evolving security threats. Relying on an onprem approach could unwittingly place valuable data assets at risk. This topic is intended to review the people, processes, and technology that can mitigate that risk.
Date: 2021-02-04 Start Time: End Time:
Learning Objectives
Introduction
• Approach
• Speaker Background
Situation, Complications, Question
• Situation – Increase in Attack Surface
• Complications – Introduction of Hybrid Computing Environments
• Question – How Can a Business Protect IT Data Assets on Premises and in the Cloud?
People
• The Board of Directors
• Chief Information Security Officer (CISO)
• Managing Consumers
Process and Policies
• Training and Awareness
• Bring Your Own Device (BYOD) Policies
• Identification and Authorization (IAM) Policies and Procedures
• Access to External Storage
• Data Loss Prevention (DLP) Solutions
• Encryption of Data in Transit and at Rest
• Multi-Form Authentication
Technology
• Zone Segmentation
• Network Vulnerability Management
• Firewalls
• Intrusion Detection Systems
• External Consumers
• User Activity Monitoring
Conclusions
• Questions
• Thank You
CLE (Please check the Detailed Credit Information page for states that have already been approved) ,Additional credit may be available upon request. Contact Lorman at 866-352-9540 for further information.
Patrick T. Cronin, Esq.-Accenture