Original broadcast date: March 25, 2021
The exponential growth of data fueled by technology modernization puts security and privacy professionals in an untenable position to protect data being generated by everyone and every “thing,” accessible from everywhere. Threat actors are able to easily monetize stolen data by selling it on the underground to other threat actors or even organizations seeking to harvest vast amounts of data. Organizations must take stock of their most precious resource (data) and prioritize the protection of it throughout its life cycle using a holistic data-centric approach. Prioritizing security strategy, controls and response activities based on a data-centric approach can help organizations balance and prioritize limited security and privacy resources.
Dave Cohen, CIPP/E, CIPP/US, Knowledge Manager, IAPP
Elizabeth Dunphy, Director, Business Unit Information Security Officer, IBM Security, IBM