Almost all organizations are open to security breaches. Whether it is simply data stored in a database, or electronic content and records stored in an associated repository, organizational information assets are vulnerable to cyber bandits and internal trolls. The difference between the two is that the cyber trolls have to first penetrate the cybersecurity infrastructure and then figure out how to navigate through and extract the information. The internal bandits have authorized direct access to the system, knows where the information is stored and can breach it in place or extract it using a variety of common tools.
This presentation will consider various architecture and authorization tools for combating these nefarious actors once they are inside the information vault. There are the traditional protections based on permissions, attribute based access control, Active Directory and identity management solutions that organizations currently use. There are newer and more advanced methods that consider data architecture such as "blockchain," sophisticated auditing and threat management notifications based on standard deviations of user’s standard access of content.
This seminar will feature Feith Systems and Software.
We have tentatively scheduled our monthly RIM seminars for the following dates, with the speaker and topic TBD: