Governance & Risk Management , Incident & Breach Response , Next-Generation Technologies & Secure Development
Defending the Attack Surface: Protecting Data and the Web Apps That Access It by Protecting Data Where it Resides and the Web Apps That Access it
As vast improvements in productivity are achieved by enabling information access to all those that need it, from wherever they are and whatever device they choose to use, traditional perimeter and end point protection tools have been shown to fail miserably in this environment.
In this session we'll look at two highly effective approaches to securing your data while still providing flexibility of access.
Data Location and Protection - you can't protect data if you don't know where it is or who is accessing it. In this segment we'll look at the criticality of data discovery and an intuitive policy enforcement platform for authorizing access to it.
Web Application Security - as many high profile breaches such as those at eBay, JPMChase and OPM have demonstrated, vulnerable web applications can provide easy access to your data. See in this segment how best in class web application protections can be put in place.