STEALTHbits Technologies, Inc © 2018
Identify Threats. Secure Data. Reduce Risk.

Data Footprint: Understanding Data Sensitivity and Prioritizing Risk

Part 1 of this blog and webinar series took you through an overview of Data Access Governance (DAG), and introduced you to the 5 crucial phases you should complete to establish a true data security program. This webinar will focus on the first 3 phases in detail which will allow you to establish a least privilege access model.
Join Adam Laub, SVP of Product Marketing at STEALTHbits Technologies, as he walks you through the discovery, collect and analyze and monitor phases of the DAG process. He'll guide you through how to find your data footprint, the most effective techniques to analyze your data's sensitivity, and what you should be looking for in your search to establish stakeholders.
Participants will learn:

  • How to get a clear picture of your organization's data footprint
  • Where your structured and unstructured data resides
  • How to classify and tag data based on sensitivity
  • The importance of effective access
  • How to determine who should be your data custodians

This webinar series qualifies for CPE credit.

If you are unable to join the live webinar, register to receive a video recording after the event.
STEALTHbits Technologies

Register Now

Date: Wednesday, September 5th
Time: 11:00 AM EDT
Duration: 60 minutes


STEALTHbits Technologies

Live Webinar

Adam Laub
SVP of Product Marketing
STEALTHbits Technologies, Inc.