
Sign up to save your podcasts
Or


Application, user, and data security are the three core components of every security program, but data is really what attackers want. In order to protect that data, we need to know where it is and what it's used for. Easier said than done. In this Say Easy, Do Hard segment, we tackle data inventory and classification.
In part 2, we discuss the steps involved in data inventory and classification, including:
Show Notes: https://securityweekly.com/bsw-383
By Security Weekly Productions4.7
3535 ratings
Application, user, and data security are the three core components of every security program, but data is really what attackers want. In order to protect that data, we need to know where it is and what it's used for. Easier said than done. In this Say Easy, Do Hard segment, we tackle data inventory and classification.
In part 2, we discuss the steps involved in data inventory and classification, including:
Show Notes: https://securityweekly.com/bsw-383

2,010 Listeners

83 Listeners

653 Listeners

101 Listeners

1,024 Listeners

33 Listeners

28,409 Listeners

189 Listeners

140 Listeners

26,629 Listeners