Data breaches, the attacks that enable them, and the best route to prevention.
Vishwas is joining Io-Tahoe webinar host, Andrew Brust for this conversation on the following:
- What common and not-so-common data exploitation attacks can look like
- The regulatory non-compliance exposure that can result
- How best to prevent such attacks, ensure compliance and,
- How to get better business value out of your data through effective management and governance.
Data breaches, the attacks that enable them and the best route to prevention
Data breaches happen all the time. And we know that our data needs to be more rigorously cataloged, better-governed, better managed and painstakingly protected. But having only a vague sense of the dangers to our data makes safeguarding it harder. The data protection mission must be clear if we want data stewards, database administrators and analysts to be vigilant and to develop disciplined habits that ensure application of best practices in data protection.
What would help everyone is a better understanding of the specific kinds of attacks that are leveled on organizations’ data. How do attackers get in, what do they look for and what do they take? In this Io-Tahoe Webinar, host Andrew Brust and special guest Vishwas Lele of Applied Information Sciences will discuss what common and not-so-common data exploitation attacks can look like, and the regulatory non-compliance exposure that can result. Brust and Lele will also discuss how best to prevent such attacks, ensure compliance and, above all, get better business value out of your data through effective management and governance.
Date: October 31, 2017
Time: 1:00 PM – 2:00 PM