Data Identification and Classification
Category

Data Identification and Classification

A critical step in protecting you organization's data is identifying the data, and where it lies and classifying it - is it your "crown jewels" or is it "public" data. There are many differences between them but most importantly is how locked away it has to be. Hear from our experts on how to start this daunting task.

Accelerating Data Protection Through Effective Data Identification

Maheswaran S - TITUS , Jaspreet Singh - E&Y  •   • 

Start this Session

Budgeting for Security: Prevention, Detection, Identification, Response or Recovery?

Session In Development  • 

Kenneth (KC) Carnes - New York Power Authority , John Checco - Bank of America , Dora Gomez - Ernst & Young , Tonguc Yaman - SOMOS  •   • 

Preview this Session

Security Breaches: Identification and Prevention Measures

Josh Brooks - Oracle  •   • 

Start this Session

How Data Classification Enhances Protection and Reduces the Severity of a Breach

Mannan Godil - Edelweiss  •   • 

Start this Session

Session Contributors

Dora Gomez

President NYCFE, InfraGard Board Member, FinCrime Consultant.

Read Bio
Jaspreet Singh

Partner, Advisory Services, E&Y

Read Bio
John Checco

Resident CISO, Proofpoint former SVP, Global Information Security Innovation Group, Bank of America

Read Bio
Josh Brooks

Director of Compliance Engineering, Oracle

Read Bio
Kenneth (KC) Carnes

CISO, New York Power Authority

Read Bio
Maheswaran S

Regional Director for South Asia, TITUS

Read Bio
Mannan Godil

CISO, Edelweiss

Read Bio

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.