Loading…
This event has ended. Visit the official site or create your own event on Sched.
ONLINE REGISTRATION IS NOW CLOSED. Please visit us on-site during registration hours next week to get a badge.

About the CONNECT Conference:                                                        

Today’s threat landscape is broad and sophisticated, and the consequences for failing to adequately protect against threats and respond appropriately when an attack is underway are far reaching. SecureAuth and Core Security deliver to enterprise-class organizations a discover, secure & protect, and respond capability that is only possible with vulnerability, endpoint, and network security fused with a strong identity protection framework.

Identity-based security automation is a new category that reflects the challenges of a silo’ed approach to enterprise security. Automation in the security operations center (SOC) is the inevitable result of increasingly sophisticated technologies and automation is only possible when false positive and negative results are minimal and the response action is precise and coordinated to minimize restrictions on legitimate access to enterprise resources.

SecureAuth and Core Security customers attending the CONNECT event will hear from company leaders, respected speakers, and industry peers on this new approach to the threat landscape. Product sessions will dive into details on current and future products, and research team members will be available to discuss new technologies. 

REGISTER TODAY

Tuesday, October 17 • 2:30pm - 3:15pm
Data Access Governance: Foundations, Roadmap and Case Studies

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

ABSTRACT:
Understanding every time someone exports data to Excel they create risk for that information, means you know the need for Data Access Governance (DAG). We will cover the challenge unstructured data poses, the foundations of securing, monitoring, and governing access to that data, and walk through how some other organizations have succeeded in controlling their risks. You will gain the insight to start asking the right questions about how your organization is approaching DAG today, and how it may need to change that approach to meet security and compliance goals in the future.

Speakers
avatar for Jonathan Sander

Jonathan Sander

CTO, STEALTHbits


Tuesday October 17, 2017 2:30pm - 3:15pm EDT
Ellington Salon B