Mime-Version: |
1.0 |
Sender: |
|
Subject: |
|
From: |
|
Date: |
Wed, 13 Jun 2018 12:11:16 -0400 |
Content-Transfer-Encoding: |
8bit |
Content-Type: |
text/plain; charset="utf-8" |
Reply-To: |
|
Parts/Attachments: |
|
|
Date: Wednesday, June 20, 2018
Time: 6pm-8:30pm
Location: Holiday Inn at Ballston
4610 Fairfax Drive
Arlington, VA 22203
Topic: Cybercontent Protection Strategy
Presented by: Mitch Farbstein
Click here for more details and to register:
http://arma-nova.org/meetinginfo.php?id=31&ts=1528125456
Almost all organizations are open to security breaches. Whether it is
simply data stored in a database, or electronic content and records stored
in an associated repository, organizational information assets are
vauneralbe to cyber bandits and internal trolls. The difference between the
two is that the cyber bandit has to first penetrate the cybersecurity
infrastructure and then figure out how to navigate and then extract the
information. The internal troll, has direct access to the system, knows
where the information is stored and can breach it in place or extract it
using a variety of common tools.
This presentation will consider various architecture and authorization tools
for combating both groups once they are inside the information vault.
There are the traditional roles of permissions, attribute based access
control, Active Directory and identity management solutions that can
currently protect the organization. There are newer and more advanced
methods that consider data architecture such as “blockchain,” sophisticated
auditing and threat management notifications based on standard deviations
of user access and content.
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]
|
|
|