Strategies and Best Practices for Proactive Data Security

Logo
Presented by

Duane Hopkins, Sr. Manager, Cyber Security at Carhartt, Martin Walter, VP Product Management at Rubrik

About this talk

Data, your most important asset, is growing at a breakneck pace and must be accessible to be useful in today’s business. How do we enable agility and innovation while enabling the necessary security controls? Gaining visibility into your data, where it resides, and who has access can help you proactively limit the scope and impact of a cyber attack. Join our industry experts as they discuss strategies and best practices for a proactive approach to data security. Make sure to take a look at the attachments as well - we've added extra learnings on how to optimise data protection and provided you with additional resources to help set you up for success.

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (76)
Subscribers (8954)
What is Zero Trust Data Management? An estimated 2 out of 3 ransomware attacks now target backups. That’s why it’s vital to ensure your backups are 100% protected and resilient. With zero trust data management no one is trustworthy. No user. No application. No device. To meet this new standard, data must be natively immutable so that it can never be modified, encrypted, or deleted by ransomware. Data needs to be ready at all times so you can recover what you need, and never pay a ransom.