By browsing this site, you are agreeing to our cookie policy. More Information

Where InfoGov Meets InfoSec: New Approaches to Data-Centric Security

60 min

A few years ago, a perimeter-based data breach was headline news. Today, the same type of breach is expected by most major corporations and government agencies. It’s clear that advanced perimeter security tools like next-gen antivirus cannot provide 100% protection.

Many organizations are now augmenting their perimeter tools with data-centric security solutions. We see Chief Privacy Officers working closer than ever with CISOs to safeguard personally identifiable information, non-public information, and sensitive corporate data. But has this truly minimized the risks? What are some of the new approaches to a data-centric security model?

Join us to discuss:

  • The role of automation and technology within InfoGov and InfoSec
  • The importance of knowing where your sensitive data is located
  • How quantified information governance can provide new perspectives on risk
  • Emerging requirements for a proactive and reactive approach to data security


  • Barclay Blair, Founder and Executive Director, Information Governance Initiative
  • Paul Shomo, Sr. Technical Manager, Guidance Software

Related Topics:
Incident Response , Incident Detection

Related Products:
EnCase Endpoint Security

You May Also Like

Product Video

Tableau TX1 Forensic Imager Product Overview

This video provides a high-level overview of the Tableau TX1 Forensic Imager, illustrating why the TX1 is the most powerful and flexible digital forensic hardware product available today.

Ransomware: Petya/NotPetya Now, But What About Tom...

Ransomware like Petya/NotPetya and WannaCry is here to stay. Join us in this webcast to learn tips and tricks to rapidly detect and respond to advanced malware.