Overview
Syllabus
Intro
How the company came about
Data Breaches
Key Things in Common
Impact of Breaches
CEO Problems
Employees make mistakes
Disgruntled employees
How do we stop attackers
Understand your data
Data protection methodology
IT risk
Global access
Eliminating global access
Simplifying permissions
Eliminate excessive access
Figure out where people have access
Sustain
Identify Data Owners
Make Decisions
Data Owner
Review Access
Automating
Protect your data
Protect from the inside
Protect from the outside
No more service accounts
Identify owners
Complete Coincidence
Risk Assessment