Why Modern Enterprises Are Choosing To Focus On Data Security

Logo
Presented by

Hamed Shahbar (VP, Head of IT Network and Security), Public Investment Fund (PIF)

About this talk

Many enterprises are spending considerable time and money on traditional perimeter-centric security, like securing infrastructure (devices and networks), but with the average cost of a breach in the United States being $9.05M US and $6.93M US in the Middle East, the time the time to look beyond traditional perimeter centric security is now. Modern enterprises are choosing to shift their security investment to focus on data security, classification and the prevention of data leakage. Join this session to hear how one of the largest sovereign wealth funds in the world shifted away from traditional security approaches and secured their data. Key takeaways will include: ● How to assess & understand the impact of data being exposed ● How to get end-users invested in the move to data classification and rights management ● How to adjust to rapidly-changing government regulations
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (16)
Subscribers (1228)
50% of the organizations have experienced a data breach caused by third parties that led to the misuse of sensitive or confidential information (Ponemon) 65% have not even identified the third parties with access to the most sensitive data (SecurityMagazine) 24% of enterprises experienced a data breach because of a cyberattack incurred by a supplier (Kaspersky) These statistics prove, once again, that the weakest link in the chain is the extended value chain around the enterprise. Critical data like Intellectual Property (IP), PII, audit, and financial data are the crown jewels of an organization and are most susceptible to a data breach. Enterprise security teams lack control and visibility into the level of access to sensitive information for external users. So, how do you ensure that your sensitive data stays protected throughout the third-party collaboration cycle and beyond? Join this Summit to learn more about: • Current challenges when it comes to sharing data externally with third parties • Why data security is critical for external collaboration • How enterprises are strengthening their security postures across Cloud and third-party systems