Data Protection and Security: Considerations, Compliance, and Best Practices
Over the past decade (and more), the desire for shielding protected information from inappropriate exposure has increasingly been hammered into law. Yet as data sets created for operational applications are repurposed for business intelligence, we often lose sight of control and management of protected information as it is streamed into a data warehouse.
Interestingly, though, corporations have spent the bulk of their security efforts on IT Security and not on data security. This seminar will introduce the concept of data security versus traditional IT Security and highlight how formulating a good strategy to protect the data stored in data warehouses can dramatically lower the risks of associated with data breach crime. Ideally IT Security needs to be layered with Data Security, this seminar will explore the approaches to protecting repurposed information as well as ensuring that business processes that use that data can continue uninterrupted .
Attendees will learn about:
- Increased regulation and directives for protecting private information
- Increased risks for repurposed data
- Understanding the difference between IT security and Data security
- How to build a data security architecture for protecting repurposed data