Back

Why old-school CISO principles still rule - how do you protect what's outside the firewall?

Executive Boardroom - 11:30 am - 11:50 am

This session discusses the challenges and draws upon information rights management, also known as enterprise rights management. This typically uses encryption, rights policies, full auditing, and other security tools to protect sensitive information. Information rights management tools protect "who, what and when" policies for documents

Key Takeaways:

  • Evaluate the possible 'band aids' that were implemented in the rush of Covid-19 and looking at the requirements and enablement of taking business to a true cloud-based platform 
  • How IT teams can ensure their support and communications are secure - everywhere 
  • Strategies to address gaps in firewall resilience plans