Location: Holiday Inn at Ballston; 4610 Fairfax Drive; Arlington, VA 22203
Topic: Cybercontent Protection Strategy
Presenter: Mitch Farbstein
Almost all organizations are open to security breaches. Whether it is
simply data stored in a database, or electronic content and records stored
in an associated repository, organizational information assets are
vauneralbe to cyber bandits and internal trolls. The difference between the
two is that the cyber bandit has to first penetrate the cybersecurity
infrastructure and then figure out how to navigate and then extract the
information. The internal troll, has direct access to the system, knows
where the information is stored and can breach it in place or extract it
using a variety of common tools.
This presentation will consider various architecture and authorization tools
for combating both groups once they are inside the information vault.
There are the traditional roles of permissions, attribute based access
control, Active Directory and identity management solutions that can
currently protect the organization. There are newer and more advanced
methods that consider data architecture such as “blockchain,” sophisticated
auditing and threat management notifications based on standard deviations
of user access and content.
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]