ISMG’s Executive Roundtables focus on specific challenges being faced by information security executives in today’s cybersecurity landscape. Moderated by one of ISMG’s Executive Editors and a guest industry expert, Roundtables give cybersecurity professionals the opportunity to discuss threats and controls with a handful of market leaders in an informal setting, from which you will emerge with new ideas and solutions you can immediately put to work to improve your own organization’s defensive posture.
Secure the Breach: Why You Don’t Need to Encrypt Everything
It’s been said that data is the new oil. Enterprises and adversaries alike want to find it, extract it, refine it, distribute it and then monetize it. So, what are you doing to protect your sensitive data, so adversaries can’t pirate it and profit from it?
If you’d like some peer support in tackling that question, then join Tom Field for an exclusive executive roundtable discussion where attendees will tackle such topics as:
- Where do you even find the most sensitive data throughout your extended enterprise?
- What are best practices for securing data in motion and at rest?
- Once data is encrypted, how best to control and authenticate access to it?
Request To Attend
Interested in participating? Submit your request to attend this roundtable*:
*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity.