By browsing this site, you are agreeing to our cookie policy. More Information

Where InfoGov Meets InfoSec: New Approaches to Data-Centric Security

60 min

A few years ago, a perimeter-based data breach was headline news. Today, the same type of breach is expected by most major corporations and government agencies. It’s clear that advanced perimeter security tools like next-gen antivirus cannot provide 100% protection.

Many organizations are now augmenting their perimeter tools with data-centric security solutions. We see Chief Privacy Officers working closer than ever with CISOs to safeguard personally identifiable information, non-public information, and sensitive corporate data. But has this truly minimized the risks? What are some of the new approaches to a data-centric security model?

Join us to discuss:

  • The role of automation and technology within InfoGov and InfoSec
  • The importance of knowing where your sensitive data is located
  • How quantified information governance can provide new perspectives on risk
  • Emerging requirements for a proactive and reactive approach to data security


  • Barclay Blair, Founder and Executive Director, Information Governance Initiative
  • Paul Shomo, Sr. Technical Manager, Guidance Software

Related Topics:
Incident Response , Incident Detection

Related Products:
EnCase Endpoint Security

You May Also Like


Splunk + EnCase: 3 Ways to Improve Operational Int...

In this critical webcast, learn how EnCase Endpoint Security can enhance the Splunk experience and how the combination of these powerful tools can close the gap between alert and response.

2016 In Review: What 5 Significant Breaches Taught...

2016 was a busy year for security teams, with many notable compromise attempts, security incidents and data breaches. Executive teams and their senior management should understand what went right, wh...