Page 64 - Cyber Defense eMagazine for September 2020
P. 64

6.  Is this data shared externally, and if so, how and with whom?

            This is an important part of the process, because it will give you more insight into the kind of data you
            have.  It will also provide you with an opportunity to implement some best practices of how the data is
            handled and protected and automate critical functions such as discovering and classifying documents
            that contain sensitive information.







            About the Author

            Deborah Kish is Executive Vice President of Marketing and Research at
            Fasoo.  She  is  responsible  for  leading  Fasoo’s  research  and  product
            strategies in the unstructured data security and privacy space. Fasoo
            provides unstructured data security and enterprise content platforms that
            enable  our  customers  to  protect,    control,  trace  and  analyze  critical
            business  information  while  enhancing  productivity.  Fasoo  has
            successfully retained leadership in the unstructured data security market
            by deploying enterprise-wide solutions globally, securing millions of users.

            Deborah      can     be      reached     online     at     ([email protected],@deborah_kish,
            linkedin.com/in/deborahkish.) and at our company website http://www.en.fasoo.com/

































            Cyber Defense eMagazine – September 2020 Edition                                                                                                                                                                                                         64
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   59   60   61   62   63   64   65   66   67   68   69