By browsing this site, you are agreeing to our cookie policy. More Information

Where InfoGov Meets InfoSec: New Approaches to Data-Centric Security

60 min

A few years ago, a perimeter-based data breach was headline news. Today, the same type of breach is expected by most major corporations and government agencies. It’s clear that advanced perimeter security tools like next-gen antivirus cannot provide 100% protection.

Many organizations are now augmenting their perimeter tools with data-centric security solutions. We see Chief Privacy Officers working closer than ever with CISOs to safeguard personally identifiable information, non-public information, and sensitive corporate data. But has this truly minimized the risks? What are some of the new approaches to a data-centric security model?

Join us to discuss:

  • The role of automation and technology within InfoGov and InfoSec
  • The importance of knowing where your sensitive data is located
  • How quantified information governance can provide new perspectives on risk
  • Emerging requirements for a proactive and reactive approach to data security


  • Barclay Blair, Founder and Executive Director, Information Governance Initiative
  • Paul Shomo, Sr. Technical Manager, Guidance Software

Related Topics:
Incident Response , Incident Detection

Related Products:
EnCase Endpoint Security

You May Also Like


Data Breaches & 5 Key Elements of an Effective Inc...

With severe data breaches becoming an almost weekly occurrence, there are plenty of best practices both pre- and post-incident to help security teams avoid the headlines. The modern CISO should expec...

[Product Series] EnCase Endpoint Security 6 Live D...

EnCase Endpoint Security is the market leading EDR solution that empowers InfoSec teams to quickly detect and respond to advanced threats, and has now been completely redesigned with a new UI/UX and enhanced detection capabilities.