| |||||
| |||||
Search Irongeek.com: ![]() ![]()
Help Irongeek.com pay for bandwidth and research equipment: |
Want to become a BeefEater, show up to this presentation
and walk away with another weapon in your arsenal to identify
and protect your Crown Jewels. Once you have your boards
protected, you are ready to create an elite grade to defend
your most valuable objects even from trusted insiders. How
to build stakeholder alignment and put data classification
into action in your organization and achieve real value by the
business being part of the process. Data identification, classification, and inventory are the building block of protecting
data. You can’t protect the crown jewels if you don’t know
where they are located. This case study will detail the efforts
currently underway in my company to create consensus and
engage multiple business units in identifying & defending our
crown jewels. Small steps are better than no steps, and by
the end of this presentation, you will have a start to building
your own counterintelligence program.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast