Pillar One: Data Protection [Six Pillars of Security Series]
And There You Have IT! - A podcast by Sirius
Categories:
In this episode, we discuss why shifting to a comprehensive data-centric strategy is critical to securing a business, how human nature has affected the evolution of cyber attacks, and how employee education is essential to security success. Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, senior principle consultant, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we’ll explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. According to Gemalto's Breach Level Index 2016 Report, data breaches led to almost 1.4 billion data records being compromised worldwide during 2016, an increase of 86 percent over 2015. And Verizon's 2016 Data Breach Investigations Report found that in 93 percent of cases where data was stolen, systems were compromised in minutes or less. Organizations, meanwhile, took weeks or more to discover that a breach had even occurred — and it was typically customers or law enforcement that sounded the alarm, not their own security measures. Traditional prevention and detection methods are being bypassed, and many organizations either don’t know what to do, or don’t have the right resources in place to advance their security. To keep up with highly skilled and aggressive attackers, we need to move beyond the predictable patterns of network security and static defenses that our cyber adversaries are well-attuned to. Listen to the podcast to learn more. 10 Keys to Data-Centric Security - It is no longer enough to focus our efforts on networks and endpoints. As IT changes continue to occur, organizations need to keep pace and advance their security by focusing on the data itself through the development of a data-centric security program. 7 Key Elements of a Successful Encryption Strategy - It’s imperative to remember that your encryption program — and IT security in general — is a process, not a product. Effective encryption takes time; in addition to careful consideration of data states and encryption techniques, there are seven key elements that can help you build a successful end-to-end approach. Forsythe Technology - For more than 40 years, Forsythe has helped companies succeed by working to optimize, modernize, and innovate enterprise IT. We develop solutions that make practical business sense from idea to implementation. We help champion innovation and deliver bottom-line results. We serve as the bridge, moving you from traditional to new IT. Whatever your business needs, we make it happen.