RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Mime-Version:
1.0
Sender:
Records Management Program <[log in to unmask]>
Subject:
From:
"D. Martonik" <[log in to unmask]>
Date:
Mon, 4 Jun 2018 11:36:32 -0400
Content-Transfer-Encoding:
8bit
Content-Type:
text/plain; charset="utf-8"
Reply-To:
Records Management Program <[log in to unmask]>
Parts/Attachments:
text/plain (40 lines)
Date: Wednesday, 6/20/2018
Time: 6:00pm - 8:30
Location: 
Holiday Inn at Ballston
4610 Fairfax Drive
Arlington, VA 22203

Topic: Cybercontent Protection Strategy
Presenter: Mitch Farbstein

Click here for details and to register:
http://arma-nova.org/meetinginfo.php?id=31&ts=1528125456

“Cyber Bandits and Internal Trolls:  With all that electronic content, what is 
your content protection strategy?”

Almost all organizations are open to security breaches.  Whether it is 
simply data stored in a database, or electronic content and records stored 
in an associated repository, organizational information assets are 
vauneralbe to cyber bandits and internal trolls.  The difference between the 
two is that the cyber bandit has to first penetrate the cybersecurity 
infrastructure and then figure out how to navigate and then extract the 
information.  The internal troll, has direct access to the system, knows 
where the information is stored and can breach it in place or extract it 
using a variety of common tools.

This presentation will consider various architecture and authorization tools 
for combating both groups once they are inside the information vault.  
There are the traditional roles of permissions, attribute based access 
control, Active Directory and identity management solutions that can 
currently protect the organization.  There are newer and more advanced 
methods that consider data architecture such as “blockchain,” sophisticated 
auditing and threat management notifications based on standard deviations 
of user access and content.

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

ATOM RSS1 RSS2