Your SlideShare is downloading. ×
0
How To Secure Sensitive Information Webinar
How To Secure Sensitive Information Webinar
How To Secure Sensitive Information Webinar
How To Secure Sensitive Information Webinar
How To Secure Sensitive Information Webinar
How To Secure Sensitive Information Webinar
How To Secure Sensitive Information Webinar
How To Secure Sensitive Information Webinar
How To Secure Sensitive Information Webinar
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

How To Secure Sensitive Information Webinar

254

Published on

Unknown privacy or confidential information can be accidently overlooked and not assigned the correct security designation. This webinar will explain how to set up a taxonomy using your organization’s …

Unknown privacy or confidential information can be accidently overlooked and not assigned the correct security designation. This webinar will explain how to set up a taxonomy using your organization’s terms and descriptors to identify potential security exposures in real time, and route to the appropriate repository for disposition.

• Identification and tagging of sensitive information
• Building the rules
• Applying an automatic content type update
• Applying an automatic action, move, notification, information rights management

Speaker: Don Miller, Vice President of Sales at Concept Searching

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
254
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. How To Secure Sensitive Information Don Miller Vice President of Sales Concept Searching donm@conceptsearching.com Twitter @conceptsearch
  • 2. Agenda • • • • • How to set up a taxonomy Identification and tagging of sensitive information Building the rules Applying an automatic content type update Applying an automatic action, move, notification, information rights management
  • 3. The Hidden Costs of Information Security “Symantec asserted that cybercrime was costing us about $110 billion per year. McAfee stated that cybercrime was instead costing us approximately $1 trillion per year.” The Global Cost of Cyber Security
  • 4. The Typical Information Security Approach • Many global organizations do not have an information security strategy • You may think your organization is protected – most likely it’s not • The issue is not the security architecture or strategy – it’s the inability to identify potential sensitive information exposures that are unknown • Sensitive information exists in documents, scanned items, faxed items, emails, and could be in any unstructured or semi-structured content • Most exposures are caused by an organization’s own staff • This is costly, damages the brand, and increases organizational risk
  • 5. The Intelligent Information Security Approach • The Concept Searching approach is fully customizable and identifies unique or industry standard descriptors • Content is automatically meta-tagged and classified to the appropriate node in the taxonomy • Based upon descriptors, phrases, or keywords from within the content • Once tagged and classified, content can be managed in accordance with regulatory or government guidelines • Proactive identification and protection of unknown privacy exposures before they occur • Monitor in real time organizationally defined vocabulary and descriptors in content as it is created or ingested
  • 6. The Benefits • Reduces organizational costs associated with data exposures, remediation, litigation, and fines and sanctions • Eliminates the risk associated with end user non-compliance issues • Eliminates manual metadata tagging and human inconsistencies that prohibit accurate identification and • Protection of unknown privacy/confidential data assets • Protects an organization by identifying and securing unknown data privacy/confidential information and preventing the portability and electronic transmission of secured assets
  • 7. Unique Approach Concept Searching has a unique approach to ensure success • Concept Searching’s unique statistical concept identification underpins all technologies • Multi-word suggestion is explicitly more valuable than single term suggestion algorithms Concept Searching provides Automatic Concept Term Extraction Triple Heart Bypass Baseball Three Organ Center Highway Avoid • conceptClassifier will generate conceptual metadata by extracting multi-word terms that identify ‘triple heart bypass’ as a concept as opposed to single keywords • Metadata can be used by any search engine index or any application/process that uses metadata.
  • 8. Demonstration
  • 9. Next How To Webinar How To Use Intelligent Metadata in Records Management Date: Wednesday, October 30th Time: 11:30 - 11:45 AM EDT Gain practical insight on the use of intelligent metadata in records management through the automatic identification of documents of record, application of content types, and defining workflows against a taxonomy mirroring the file plan. • Records Identification, not Records Management • Tagging of content • Identification of documents of record • Automatic tagging with retention codes • Automatic application of a content type • Applying an action Speaker: Don Miller, Vice President of Sales at Concept Searching To Register: https://www3.gotomeeting.com/register/962276526

×