
Sign up to save your podcasts
Or


Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/
Want to listen to other episodes? www.Federaltechpodcast.com
Federal technology leaders operate in a confusing world. On the one hand, they must grant access to data that is needed by users; on the other hand, they must comply with security requirements that severely restrict that access.
Craig Mueller from Varonis offers a solution: efficient data management will ensure that all information will be carefully categorized to allow this razor's edge of operation. The approach will allow for a concept called "complete coverage."
"Complete coverage extends to everything in the hybrid cloud as well as legacy systems.
During the interview, Craig Mueller describes a concept called Data Security Posture Management. Essentially, this process allows for complete coverage, governance, and user analytics.
Many do not realize that AI tools crawl a network and assemble as much as they can. In a federal application, there may be information that is not categorized correctly and should not be allowed to be scanned.
This is a classic example of data that gives the ability to share too easily.
Proper organization of data, both structured and unstructured, will all the balancing game of access and security to be deployed and scaled.
By John Gilroy5
66 ratings
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/
Want to listen to other episodes? www.Federaltechpodcast.com
Federal technology leaders operate in a confusing world. On the one hand, they must grant access to data that is needed by users; on the other hand, they must comply with security requirements that severely restrict that access.
Craig Mueller from Varonis offers a solution: efficient data management will ensure that all information will be carefully categorized to allow this razor's edge of operation. The approach will allow for a concept called "complete coverage."
"Complete coverage extends to everything in the hybrid cloud as well as legacy systems.
During the interview, Craig Mueller describes a concept called Data Security Posture Management. Essentially, this process allows for complete coverage, governance, and user analytics.
Many do not realize that AI tools crawl a network and assemble as much as they can. In a federal application, there may be information that is not categorized correctly and should not be allowed to be scanned.
This is a classic example of data that gives the ability to share too easily.
Proper organization of data, both structured and unstructured, will all the balancing game of access and security to be deployed and scaled.

7,701 Listeners

201 Listeners

112,327 Listeners

211 Listeners

208 Listeners

561 Listeners