Unknown data, hidden threats, wasted spend: tackling abandoned and shadow data

Logo
Presented by

Joe Gregory, Head of Customer Success and Support, Normalyze and Vamsi Koduru, Director of Product Management, Normalyze

About this talk

Abandoned and shadow data are not just buzzwords; they represent a critical challenge in data management and security. Is it possible that you may be storing data you don’t know you have, some of which might include valuable or sensitive information…all of which is completely forgotten by everyone except cyber criminals? There are valid reasons why this happens: -Employees create data repositories in Google Drive, SharePoint, OneDrive, Dropbox, that IT is unaware of. -Data is backed up without a lifecycle plan, so even when the originating data sources are purged, the backups are forgotten. -Layoffs, terminations, and other employee activities occur, but no one thinks about the data they leave behind. -Organizations going through mergers and acquisitions consolidate data repositories, sometimes leaving the original data stores in place. Join us for an insightful webinar where we delve into the challenges and solutions associated with abandoned data stores. What you will learn during this 30-minute live event: -The risks and costs associated with data you don’t know you have. -How DSPM can help security and data teams gain detailed insights into who can access this data, the last time it was accessed, how much of it is valuable or sensitive data. -Best practices for remediation based on compliance requirements, backup options and more. This overlooked data costs your organization money and increases security risks. Why not clear out that data to optimize your storage management and improve your security posture? Register now!
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (32)
Subscribers (6046)
We discuss how to identify the full range of risks present against your cloud, on-prem and hybrid data, and eliminate the risks that matter the most. Let's put data security at the center of information security--where it belongs.