SlideShare a Scribd company logo
Make a case for
data classification in
your organization
www.watchfulsoftware.com
June 22,2016
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2
Agenda
1 Introductions & “House Rules”
2 Business Context & Challenges
3 Data Classification is key
4 Data Classification is Evolving
5 First Generation tools “User Driven”
6 Second Generation tools “User Friendly”
7 Use Case on policy driven rules
8 RightsWATCH Audit Trail
9 Q&A andWrap-up
Introductions
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3
Dick Olsen House Rules
 You are muted centrally. You don’t need to
mute/unmute yourself
 This webinar is being recorded. You’ll have access to it
On-demand at www.watchfulsoftware.com/en/resources
 The Q&A session will be at the end. You are welcomed
to enter questions anytime, using the Questions feature
in the GoToWebinar control panel
Dick Olsen serves as the marketing
lead for Watchful Software and is
responsible for brand positioning and
messaging.
1 Securing data and company secrets has become increasing difficult
2 40% of enterprises will experience data breach this year
3 Data breaches damage reputations, customers and employees
4 Corporate security policies are often complex and difficult for users to understand
Business Context & Challenges
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4
Data Classification is the most effective step to securing your data
• Securing Data as it is created through
Classification is the most effective step in
securing your data
• Works at the point of creation
• Is driven by your corporate policies
• Determines who can see the data before it is
shared
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5
Policy-driven Classification
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6
data is truly sensitive?
should have access to it?
is the data to be handled?
should the classification change?
What
Who
How
When
should the data be protected?Where
Data classification tools are evolving to become more effective
• Data classification tools are evolving to
become more effective
• As a data security professional it is your
responsibility to continually upgrade your
solutions
• Most employees do not know or care much
about protecting data
• “It is somebody else's job”
• It is time consuming and complicated to
comply with policies
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7
First Generation User Driven Data Classification Products
• First generation classification tools are
classified as “user driven”
• Required in-depth understanding of your
corporate security policies
• User judgement calls
• Drop down questions
• Classification errors
• Incomplete compliance
• Result in Leaks
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8
Second Generation User Friendly Automated Systems
• RightsWATCH is a user friendly automated
system that works to classify your data in
compliance with your security guidelines
• Digitizes your corporate classification
guidelines to automate designation of data
• Properly classifies information when it is
created so it is handled appropriately
• Streamlines and simplifies the user experience
• Relieves the end user from the need to
understand and apply corporate policies
• Makes your existing infrastructure work better
• Improves compliance
• Works on new and legacy files
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
RightsWATCH reads data as it is being created
• RightsWATCH reads data as it is being created
by your users
• Applies your classification policies and assigns
the correct classification real time
• Eliminates errors
• If authorized, enables classification override
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10
Use Cases on Policy-driven Rules
1. Emails are automatically classified based on:
1) to whom is the email being sent
2) which content is written in the email
3) which files are attached to it
6/22/2016 © Copyright www.watchfulsoftware.com. 2013 All Rights Reserved. 11
Content, Context and
Metadata aware
Policy-driven Rules
Use Cases on Policy-driven Rules
2. RightsWATCH’s Global Protector dynamically scans legacy data files and automatically
classifies ALL files in that repository, enforcing the policy rules.
6/22/2016 © Copyright www.watchfulsoftware.com. 2013 All Rights Reserved. 12
Global Protector
Server
Use Cases on Policy-driven Rules
3. A user is prevented from saving a document to an unauthorized location and/or with
unauthorized content. RightsWATCH blocks the file from being saved and shows the user the
reason why.
6/22/2016 © Copyright www.watchfulsoftware.com. 2013 All Rights Reserved. 13
Warn/Block
Rules
RightsWatch provides an audit trail
• RightsWATCH provides a comprehensive
audit trail
• Documents and traces any authorized or
unauthorized access to confidential data
• Provides real time information detailing who
is doing what, when and how with classified
information
• Enables organizations to improve regulatory
compliance
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 14
RightsWATCH Summary
• RightsWATCH automated systems represent a
significant upgrade to earlier user driven
products
• Data classification in compliance with
corporate protocols at the point of creation is
an essential step in the plan to secure data
• Early tools are complicated and failed to gain
user support and usage proved minimal
• RightsWATCH automated policy driven
product streamlines the user experience
• RightsWATCH improves your existing security
infrastructure and compliance
• RightsWATCH is necessary upgrade to protect
your data
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 15
Check out the “Resources” area on www.watchfulsoftware.com and watch
short product walkthrough demonstrations of how RightsWATCH address a
comprehensive set of use cases
E-mail info@watchfulsoftware.com to request a demo of RightsWATCH
This webinar is being recorded.You’ll have access to it On-demand at
www.watchfulsoftware.com
Q&A
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 16
www.watchfulsoftware.com
June 22, 2016
Make a case for data
classification in your
organization

More Related Content

What's hot

Five Elements of Effective Data Access Governance
Five Elements of Effective Data Access Governance  Five Elements of Effective Data Access Governance
Five Elements of Effective Data Access Governance Privacera
 
The economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos LoutasThe economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos LoutasOpen Knowledge Belgium
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera
 
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...Jeff Kelly
 
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Index Engines Inc.
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceIndex Engines Inc.
 
Case Study For Data Governance Portal
Case Study For Data Governance PortalCase Study For Data Governance Portal
Case Study For Data Governance PortalMike Taylor
 
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]TrustArc
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightSymantec
 
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...TrustArc
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataNeo4j
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsRevulytics Inc.
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...TrustArc
 
data_blending
data_blendingdata_blending
data_blendingsubit1615
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]TrustArc
 
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesInformation Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesCraig Adams
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 

What's hot (20)

Five Elements of Effective Data Access Governance
Five Elements of Effective Data Access Governance  Five Elements of Effective Data Access Governance
Five Elements of Effective Data Access Governance
 
The economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos LoutasThe economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos Loutas
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020
 
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
 
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017
 
The GDPR timeline - Stephen Bailey, NCC Group
The GDPR timeline - Stephen Bailey, NCC GroupThe GDPR timeline - Stephen Bailey, NCC Group
The GDPR timeline - Stephen Bailey, NCC Group
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR Compliance
 
Case Study For Data Governance Portal
Case Study For Data Governance PortalCase Study For Data Governance Portal
Case Study For Data Governance Portal
 
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
 
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage Analytics
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
data_blending
data_blendingdata_blending
data_blending
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
 
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesInformation Governance Maturity for Financial Services
Information Governance Maturity for Financial Services
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 

Viewers also liked

Diagnosticos de problemas de funcionamiento en vehiculos obd i & ii
Diagnosticos de problemas de funcionamiento en vehiculos obd i & iiDiagnosticos de problemas de funcionamiento en vehiculos obd i & ii
Diagnosticos de problemas de funcionamiento en vehiculos obd i & iigustavo saravia
 
New York Daily News McCarthy
New York Daily News McCarthyNew York Daily News McCarthy
New York Daily News McCarthyKraig Bohot
 
The future of digital marketing - Sophie Iredale #passion4digital
The future of digital marketing - Sophie Iredale #passion4digitalThe future of digital marketing - Sophie Iredale #passion4digital
The future of digital marketing - Sophie Iredale #passion4digitalMasters in Digital Marketing Europe
 
MBA_Energy__Industrial_Training_Certificate
MBA_Energy__Industrial_Training_CertificateMBA_Energy__Industrial_Training_Certificate
MBA_Energy__Industrial_Training_CertificateGaurav Agarwal
 
Condition Monitoring of Transformer
Condition Monitoring of TransformerCondition Monitoring of Transformer
Condition Monitoring of TransformerMakwana Mehul
 
Uvod u povijest
Uvod u povijestUvod u povijest
Uvod u povijestbatica1
 
Transformation of the Electronic Payments Industry - Strategies for Growth
Transformation of the Electronic Payments Industry - Strategies for GrowthTransformation of the Electronic Payments Industry - Strategies for Growth
Transformation of the Electronic Payments Industry - Strategies for Growthfrancisfoo
 
Narodi istočne obale sredozemlja feničani i i żidovi
Narodi istočne obale sredozemlja   feničani  i i żidoviNarodi istočne obale sredozemlja   feničani  i i żidovi
Narodi istočne obale sredozemlja feničani i i żidoviŠkola Futura
 
Federal Court Order Suspending AB 219
Federal Court Order Suspending AB 219Federal Court Order Suspending AB 219
Federal Court Order Suspending AB 219Jon Welner
 

Viewers also liked (12)

Diagnosticos de problemas de funcionamiento en vehiculos obd i & ii
Diagnosticos de problemas de funcionamiento en vehiculos obd i & iiDiagnosticos de problemas de funcionamiento en vehiculos obd i & ii
Diagnosticos de problemas de funcionamiento en vehiculos obd i & ii
 
New York Daily News McCarthy
New York Daily News McCarthyNew York Daily News McCarthy
New York Daily News McCarthy
 
The future of digital marketing - Sophie Iredale #passion4digital
The future of digital marketing - Sophie Iredale #passion4digitalThe future of digital marketing - Sophie Iredale #passion4digital
The future of digital marketing - Sophie Iredale #passion4digital
 
Trabajo de fisica.compressed
Trabajo de fisica.compressedTrabajo de fisica.compressed
Trabajo de fisica.compressed
 
MBA_Energy__Industrial_Training_Certificate
MBA_Energy__Industrial_Training_CertificateMBA_Energy__Industrial_Training_Certificate
MBA_Energy__Industrial_Training_Certificate
 
resume11
resume11resume11
resume11
 
Condition Monitoring of Transformer
Condition Monitoring of TransformerCondition Monitoring of Transformer
Condition Monitoring of Transformer
 
Rhon resume
Rhon resumeRhon resume
Rhon resume
 
Uvod u povijest
Uvod u povijestUvod u povijest
Uvod u povijest
 
Transformation of the Electronic Payments Industry - Strategies for Growth
Transformation of the Electronic Payments Industry - Strategies for GrowthTransformation of the Electronic Payments Industry - Strategies for Growth
Transformation of the Electronic Payments Industry - Strategies for Growth
 
Narodi istočne obale sredozemlja feničani i i żidovi
Narodi istočne obale sredozemlja   feničani  i i żidoviNarodi istočne obale sredozemlja   feničani  i i żidovi
Narodi istočne obale sredozemlja feničani i i żidovi
 
Federal Court Order Suspending AB 219
Federal Court Order Suspending AB 219Federal Court Order Suspending AB 219
Federal Court Order Suspending AB 219
 

Similar to Make a case for Data Classification in your organization

Secure information sharing - the external user dilemma
Secure information sharing - the external user dilemmaSecure information sharing - the external user dilemma
Secure information sharing - the external user dilemmaWatchful Software
 
How classification augments data loss prevention
How classification augments data loss preventionHow classification augments data loss prevention
How classification augments data loss preventionWatchful Software
 
How classification changes the way you look into corporate data
How classification changes the way you look into corporate dataHow classification changes the way you look into corporate data
How classification changes the way you look into corporate dataWatchful Software
 
FDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection IntelligenceFDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection IntelligenceArmin Torres
 
FDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection IntelligenceFDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection IntelligenceArmin Torres
 
Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16Ravindran Vasu
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are comingErnest Staats
 
Enterprise Data Management
Enterprise Data ManagementEnterprise Data Management
Enterprise Data ManagementBhavendra Chavan
 
The path to most GRC requirements
The path to most GRC requirementsThe path to most GRC requirements
The path to most GRC requirementsWatchful Software
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of ThingsPECB
 
OWASPTop10PrivacyRisks_v2(1).pptx
OWASPTop10PrivacyRisks_v2(1).pptxOWASPTop10PrivacyRisks_v2(1).pptx
OWASPTop10PrivacyRisks_v2(1).pptxagam37
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineQlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineSrikanth Sharma Boddupalli
 
Valdas Maksimavičius - Reducing Technology Risks through Prototyping
Valdas Maksimavičius - Reducing Technology Risks through PrototypingValdas Maksimavičius - Reducing Technology Risks through Prototyping
Valdas Maksimavičius - Reducing Technology Risks through PrototypingAgile Lietuva
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.Imperva
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365Don Daubert
 

Similar to Make a case for Data Classification in your organization (20)

Secure information sharing - the external user dilemma
Secure information sharing - the external user dilemmaSecure information sharing - the external user dilemma
Secure information sharing - the external user dilemma
 
How classification augments data loss prevention
How classification augments data loss preventionHow classification augments data loss prevention
How classification augments data loss prevention
 
Watchful Corporate Overview
Watchful Corporate OverviewWatchful Corporate Overview
Watchful Corporate Overview
 
How classification changes the way you look into corporate data
How classification changes the way you look into corporate dataHow classification changes the way you look into corporate data
How classification changes the way you look into corporate data
 
FDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection IntelligenceFDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection Intelligence
 
FDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection IntelligenceFDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection Intelligence
 
Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Enterprise Data Management
Enterprise Data ManagementEnterprise Data Management
Enterprise Data Management
 
The path to most GRC requirements
The path to most GRC requirementsThe path to most GRC requirements
The path to most GRC requirements
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
OWASPTop10PrivacyRisks_v2(1).pptx
OWASPTop10PrivacyRisks_v2(1).pptxOWASPTop10PrivacyRisks_v2(1).pptx
OWASPTop10PrivacyRisks_v2(1).pptx
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineQlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
 
Valdas Maksimavičius - Reducing Technology Risks through Prototyping
Valdas Maksimavičius - Reducing Technology Risks through PrototypingValdas Maksimavičius - Reducing Technology Risks through Prototyping
Valdas Maksimavičius - Reducing Technology Risks through Prototyping
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 

More from Watchful Software

Behavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprintingBehavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprintingWatchful Software
 
Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationWatchful Software
 
Leverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHLeverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHWatchful Software
 
Global Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationGlobal Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationWatchful Software
 
You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricksWatchful Software
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security BattlegroundWatchful Software
 
RightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMSRightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMSWatchful Software
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsWatchful Software
 
Bringing policy based classification to Sharepoint
Bringing policy based classification to SharepointBringing policy based classification to Sharepoint
Bringing policy based classification to SharepointWatchful Software
 
The 5 Key Trends for Insider Threat
The 5 Key Trends for Insider ThreatThe 5 Key Trends for Insider Threat
The 5 Key Trends for Insider ThreatWatchful Software
 

More from Watchful Software (11)

Behavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprintingBehavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprinting
 
Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data Classification
 
Leverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHLeverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCH
 
Global Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationGlobal Thought Leadership Webcast Presentation
Global Thought Leadership Webcast Presentation
 
You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricks
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
RightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMSRightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMS
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance Requirements
 
How to leverage office 365
How to leverage office 365How to leverage office 365
How to leverage office 365
 
Bringing policy based classification to Sharepoint
Bringing policy based classification to SharepointBringing policy based classification to Sharepoint
Bringing policy based classification to Sharepoint
 
The 5 Key Trends for Insider Threat
The 5 Key Trends for Insider ThreatThe 5 Key Trends for Insider Threat
The 5 Key Trends for Insider Threat
 

Recently uploaded

Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandIES VE
 
Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationWave PLM
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationHelp Desk Migration
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareinfo611746
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowPeter Caitens
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfOrtus Solutions, Corp
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdfkalichargn70th171
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Krakówbim.edu.pl
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisNeo4j
 
A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationHelp Desk Migration
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...Alluxio, Inc.
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfVictor Lopez
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems ApproachNeo4j
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAlluxio, Inc.
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockSkilrock Technologies
 
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAlluxio, Inc.
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAlluxio, Inc.
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessWSO2
 

Recently uploaded (20)

Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM Integration
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data Migration
 
Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting software
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysis
 
A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data Migration
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by Skilrock
 
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 

Make a case for Data Classification in your organization

  • 1. Make a case for data classification in your organization www.watchfulsoftware.com June 22,2016
  • 2. Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2 Agenda 1 Introductions & “House Rules” 2 Business Context & Challenges 3 Data Classification is key 4 Data Classification is Evolving 5 First Generation tools “User Driven” 6 Second Generation tools “User Friendly” 7 Use Case on policy driven rules 8 RightsWATCH Audit Trail 9 Q&A andWrap-up
  • 3. Introductions Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3 Dick Olsen House Rules  You are muted centrally. You don’t need to mute/unmute yourself  This webinar is being recorded. You’ll have access to it On-demand at www.watchfulsoftware.com/en/resources  The Q&A session will be at the end. You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel Dick Olsen serves as the marketing lead for Watchful Software and is responsible for brand positioning and messaging.
  • 4. 1 Securing data and company secrets has become increasing difficult 2 40% of enterprises will experience data breach this year 3 Data breaches damage reputations, customers and employees 4 Corporate security policies are often complex and difficult for users to understand Business Context & Challenges Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4
  • 5. Data Classification is the most effective step to securing your data • Securing Data as it is created through Classification is the most effective step in securing your data • Works at the point of creation • Is driven by your corporate policies • Determines who can see the data before it is shared Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5
  • 6. Policy-driven Classification Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6 data is truly sensitive? should have access to it? is the data to be handled? should the classification change? What Who How When should the data be protected?Where
  • 7. Data classification tools are evolving to become more effective • Data classification tools are evolving to become more effective • As a data security professional it is your responsibility to continually upgrade your solutions • Most employees do not know or care much about protecting data • “It is somebody else's job” • It is time consuming and complicated to comply with policies Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7
  • 8. First Generation User Driven Data Classification Products • First generation classification tools are classified as “user driven” • Required in-depth understanding of your corporate security policies • User judgement calls • Drop down questions • Classification errors • Incomplete compliance • Result in Leaks Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8
  • 9. Second Generation User Friendly Automated Systems • RightsWATCH is a user friendly automated system that works to classify your data in compliance with your security guidelines • Digitizes your corporate classification guidelines to automate designation of data • Properly classifies information when it is created so it is handled appropriately • Streamlines and simplifies the user experience • Relieves the end user from the need to understand and apply corporate policies • Makes your existing infrastructure work better • Improves compliance • Works on new and legacy files Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
  • 10. RightsWATCH reads data as it is being created • RightsWATCH reads data as it is being created by your users • Applies your classification policies and assigns the correct classification real time • Eliminates errors • If authorized, enables classification override Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10
  • 11. Use Cases on Policy-driven Rules 1. Emails are automatically classified based on: 1) to whom is the email being sent 2) which content is written in the email 3) which files are attached to it 6/22/2016 © Copyright www.watchfulsoftware.com. 2013 All Rights Reserved. 11 Content, Context and Metadata aware Policy-driven Rules
  • 12. Use Cases on Policy-driven Rules 2. RightsWATCH’s Global Protector dynamically scans legacy data files and automatically classifies ALL files in that repository, enforcing the policy rules. 6/22/2016 © Copyright www.watchfulsoftware.com. 2013 All Rights Reserved. 12 Global Protector Server
  • 13. Use Cases on Policy-driven Rules 3. A user is prevented from saving a document to an unauthorized location and/or with unauthorized content. RightsWATCH blocks the file from being saved and shows the user the reason why. 6/22/2016 © Copyright www.watchfulsoftware.com. 2013 All Rights Reserved. 13 Warn/Block Rules
  • 14. RightsWatch provides an audit trail • RightsWATCH provides a comprehensive audit trail • Documents and traces any authorized or unauthorized access to confidential data • Provides real time information detailing who is doing what, when and how with classified information • Enables organizations to improve regulatory compliance Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 14
  • 15. RightsWATCH Summary • RightsWATCH automated systems represent a significant upgrade to earlier user driven products • Data classification in compliance with corporate protocols at the point of creation is an essential step in the plan to secure data • Early tools are complicated and failed to gain user support and usage proved minimal • RightsWATCH automated policy driven product streamlines the user experience • RightsWATCH improves your existing security infrastructure and compliance • RightsWATCH is necessary upgrade to protect your data Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 15
  • 16. Check out the “Resources” area on www.watchfulsoftware.com and watch short product walkthrough demonstrations of how RightsWATCH address a comprehensive set of use cases E-mail info@watchfulsoftware.com to request a demo of RightsWATCH This webinar is being recorded.You’ll have access to it On-demand at www.watchfulsoftware.com Q&A Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 16
  • 17. www.watchfulsoftware.com June 22, 2016 Make a case for data classification in your organization

Editor's Notes

  1. Organizations of all sizes are challenged to protect a growing quantity of valuable digital information against careless mishandling and malicious use. The increasing incidences of information theft underscore the need for better protection of digital information. Implementing a solid Information Classification Policy (ICP) is the first step to protecting sensitive information. A growing list of legislative and regulatory requirements adds to the ongoing task of protecting digital files and information Intricate and unclear data classification strategies that aren’t understood by users and end up never being used in the real world; PLUS the classification requirements, many times, don’t take in consideration the business impact and the volume of legacy data present in the organization.
  2. Organizations need to control and protect their sensitive and confidential information against information leakage, by dynamically applying a pre-defined Information Control Policy to all types of unstructured information (emails, documents, spreadsheets, presentations, etc.) as that information is created. Data classification should be established by setting a core set of principles regarding the proper use, handling and applicability of various protection profiles for each data category. To successfully implement a policy-driven classification process, your organization must know it’s data, and for that it must answer a few questions…
  3. There are 2 main methods to achieve data classification: Policy-driven: that relieves the user from the workload and overhead of having to know, understand and apply corporate policies, while at the same time increasing user and organizational awareness of the value and sensitivity of the data and ensuring compliance. User-driven: When the user is able to make data classification decisions or override automatic classification if corporate policy allows it. RightsWATCH enables you to have the flexibility to combine both methods according to your company’s security policies. For example, corporately defined policy rules can overwrite user decisions and choices if your company chooses to.
  4. To finalize, let me ask you to participate in a short 3 question quiz: - So, want we are asking is “Which type of rule are we applying in these use cases?”