
Sign up to save your podcasts
Or
Application, user, and data security are the three core components of every security program, but data is really what attackers want. In order to protect that data, we need to know where it is and what it's used for. Easier said than done. In this Say Easy, Do Hard segment, we tackle data inventory and classification.
In part 2, we discuss the steps involved in data inventory and classification, including:
Show Notes: https://securityweekly.com/bsw-383
4.7
3535 ratings
Application, user, and data security are the three core components of every security program, but data is really what attackers want. In order to protect that data, we need to know where it is and what it's used for. Easier said than done. In this Say Easy, Do Hard segment, we tackle data inventory and classification.
In part 2, we discuss the steps involved in data inventory and classification, including:
Show Notes: https://securityweekly.com/bsw-383
1,961 Listeners
2,013 Listeners
363 Listeners
634 Listeners
369 Listeners
1,007 Listeners
313 Listeners
387 Listeners
7,836 Listeners
945 Listeners
142 Listeners
182 Listeners
194 Listeners
120 Listeners
33 Listeners