SlideShare a Scribd company logo
© Concept Searching 2018
Discovery, Risk, and Insight
in a Metadata-Driven World
www.conceptsearching.com
marketing@conceptsearching.com
Twitter @conceptsearch
Ilia Sotnikov
VP Product Management
Netwrix
www.netwrix.com
Jeff Melnick
Manager Sales Engineering
Netwrix
www.netwrix.com
Robert Piddocke
VP Channel and Business Development
Concept Searching
© Concept Searching 2018
Participants
Jeff Melnick – Manager Sales Engineering at Netwrix has
over 15 years of experience in the IT field performing Active
Directory and systems migrations, integrations, and installations.
Ilia Sotnikov – VP Product Management at Netwrix is
responsible for product vision and strategy, and has over 15
years of experience in IT management in the software market.
Robert Piddocke – VP Channel and Business Development
at Concept Searching has over 15 years of business
development experience, implemented hundreds of search
solutions, and authored books on SharePoint Search.
© Concept Searching 2018
Agenda
• Who we are and what we do
• The importance of metadata
• Risk of data ignorance
• Solution
• Demos
• How can we help?
© Concept Searching 2018
• Company founded in 2002
• Product launched in 2003
• Focus on management of structured and unstructured information
• Profitable, debt free
• Technology Platform
• Delivered as a web service
• Automatic concept identification, content tagging, auto-classification,
taxonomy management
• Only statistical vendor that can extract conceptual metadata
• 9 years KMWorld ‘100 Companies that Matter in Knowledge Management’
9 years KMWorld ‘Trend Setting Product’
• Authority to Operate enterprise wide US Air Force, NETCON US Army,
and Canadian SLSA
• Client base: Fortune 500/1000 organizations in Healthcare,
Financial Services, Manufacturing, Energy, Professional Services,
Pharmaceutical, Public sector and DoD
• Microsoft Gold Certification in Application Development
• Member of SharePoint PAC and TAP programs
• Suitable for all versions of SharePoint on-premises and SharePoint Online,
including the vNext dedicated platform and the government cloud
Who Is Concept Searching?
© Concept Searching 2018
Who Is Netwrix?
Year of foundation:
2006
Headquarters location:
Irvine, California
Global customer base:
Over 9,000
Customer support:
Global 24/5 support with 97%
customer satisfaction
Recognition:
Among the fastest growing
software companies in the US,
with more than 140 industry
awards from Redmond
Magazine, SC Magazine,
Windows IT Pro and others
© Concept Searching 2018
About Netwrix Auditor
A visibility platform for user behavior analysis and risk mitigation
that enables control over changes, configurations, and access in
hybrid IT environments
It provides security intelligence to identify security holes, detect
anomalies in user behavior, and investigate threat patterns in time
to prevent real damage
Netwrix Auditor
© Concept Searching 2018
Increase the Productivity
of Security and Operations
Teams
Netwrix Auditor Benefits
Pass Compliance Audits
with Less Effort
and Expense
Detect Data Security Threats,
both On Premises and in the
Cloud
© Concept Searching 2018
Compound Term Processing, Classification,
and Taxonomy Management
8
© Concept Searching 2018
What Does Metadata Impact?
© Concept Searching 2018
What Is the Cost of Poor Metadata?
© Concept Searching 2018
How much organizational risk is acceptable?
© Concept Searching 2018
Data Security Challenges
of respondents say
they need up to 50%
more cybersecurity
budget
87% of respondents
consider a careless
member of staff to be
the most likely source
of attack
77%
of boards have
sufficient cybersecurity
knowledge for effective
oversight of cyber risks
36%
of organizations still
keep cybersecurity
reporting mostly within
the IT function
63%
feel it is very likely
they would detect a
sophisticated cyber
attack
12%
say their cybersecurity
function does not fully
meet their organization’s
needs
89%
Source: Cybersecurity regained: preparing to face cyber attacks – EY Global Information Security Survey 2017-18
© Concept Searching 2018
Unstructured Data Security
? ? ?
? ? ?
? ? ?
? ? ?
• Do you store terabytes of data on your file shares?
• Do you know which of that data needs to be protected?
• Are you sure there are no critical assets in unsecure locations?
• Do you know who has access to sensitive files?
• Can you bring down the risk?
© Concept Searching 2018
© Concept Searching 2018
Where is My Sensitive Data Located?
Gaining a high-level view
of the sensitive data you store
Discovering sensitive data stored
outside of a secure location
Prioritizing efforts and spending
on the most critical assets first
© Concept Searching 2018
Who Has Access to the Sensitive Files?
Identifying owners
of sensitive data
Streamlining attestations
of access rights to sensitive data
Finding overexposed
pieces of sensitive data
© Concept Searching 2018
Is There Any Unauthorized Activity?
Detecting unauthorized activity
around your sensitive data
© Concept Searching 2018
What About Compliance?
Accommodating new
data security regulations
Proving the effectiveness
of your data security controls to auditors
Determining the severity
of a data breach
© Concept Searching 2018
Out-of-the-box Classification Rules
• General Data Protection Regulation (GDPR)
• GDPR prohibited records
• Health Insurance Portability and Accountability Act (HIPAA)
• Gramm-Leach-Bliley Act (GLBA)
• Payment Card Industry Data Security Standard (PCI DSS)
• Personally Identifiable Information (PII)
• Protected Health Information (PHI)
• Generic finance records
© Concept Searching 2018
Introduction to Netwrix Auditor
Data Discovery and Classification
© Concept Searching 2018
Metadata and Classification
An Ounce of Prevention is Worth a Pound of Cure
• Cybersecurity
• Data breaches
• Noncompliance
• Information governance
• GDPR
• Secure collaboration
• Intelligent migration
• Protection of confidential information
• Business-critical
• eDiscovery
• Legal holds
• Archival
• Social media
• Email
© Concept Searching 2018
“52% of all information currently stored and processed by
organizations around the world is considered ‘dark’ data,
whose value is unknown.”
“Another 33% of data is considered redundant, obsolete,
or trivial (ROT) and is known to be useless.”
Global Databerg Report
© Concept Searching 2018
The Egg Does Come Before the Chicken
Content Optimization
• You have to find your data before you can protect or act on it
• Evaluate the integrity of the data
• Is it trustworthy?
• Redundant, stale, obsolete, dupes and near dupes, plain old garbage –
grocery list, office party photos
• What type of data – unstructured, semi-structured, structured, or a mix?
• Archive/delete
• Volatility of data
• Real-time monitoring and/or workflows?
• Ongoing management of taxonomies
• Centralized control – metadata repository
• What do you want to do with the data?
© Concept Searching 2018
• Automated metadata generation is difficult to
achieve consistently with high precision and recall
• Many products on the market today require complex
rules to be generated, often involving search syntax
and complicated Boolean expressions
• Some products claim use of AI and NLP, but
in reality are proximity and keyword
• Some require a document training set for
every term to be processed
• Some of these products employ linguistic
techniques that will not perform consistently
across different vertical markets, and are
typically not scalable
Result is a very high initial cost
in terms of time and qualified staff
Precision Versus Recall
© Concept Searching 2018
Automating Data Discovery and Classification
© Concept Searching 2018
How Can We Help?
• Requirements discussion
• Demonstration
• Proof of Concept
• Please contact us via our website for additional information
or to request a demo
© Concept Searching 2018
© Concept Searching 2018
Next Webinar in Metadata-Driven World Series
Getting Lost in Semantics – Selecting the Right Search Engine
Wednesday, September 12, 2018
Register
The definition of semantics can vary, depending on who is using it. Add to
that artificial intelligence and natural language processing, and you may
find that search has become quite complicated.
Join us as we take the mystery and confusion out of search. Discover
which technologies work, which don’t, and why.
Read more and register in the Upcoming Webinars area of our website.
© Concept Searching 2018
Thank You
www.conceptsearching.com
marketing@conceptsearching.com
Twitter @conceptsearch
Ilia Sotnikov
VP Product Management
Netwrix
www.netwrix.com
Jeff Melnick
Manager Sales Engineering
Netwrix
www.netwrix.com
Robert Piddocke
VP Channel and Business Development
Concept Searching

More Related Content

What's hot

ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019
ZIGRAM
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
AIIM International
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
Omo Osagiede
 
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Concept Searching, Inc
 
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
TrustArc
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
Gary Dodson
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR Compliance
Index Engines Inc.
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Druva
 
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Index Engines Inc.
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
Druva
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
TrustArc
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA Compliance
Precisely
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
Priyanka Aash
 
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
TrustArc
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Enterprise Management Associates
 
Security&Governance
Security&GovernanceSecurity&Governance
Security&Governance
Datio Big Data
 
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
TrustArc
 
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
TrustArc
 
Ensuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideEnsuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify Guide
Zymplify
 

What's hot (20)

ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
 
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
 
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR Compliance
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA Compliance
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Security&Governance
Security&GovernanceSecurity&Governance
Security&Governance
 
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
 
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
 
Ensuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideEnsuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify Guide
 

Similar to Discovery, Risk, and Insight in a Metadata-Driven World Webinar

Metadata-Driven Cleanup of Files, Content, and Email Webinar
Metadata-Driven Cleanup of Files, Content, and Email WebinarMetadata-Driven Cleanup of Files, Content, and Email Webinar
Metadata-Driven Cleanup of Files, Content, and Email Webinar
Concept Searching, Inc
 
Drowning in Data and Starving for Information
Drowning in Dataand Starving for InformationDrowning in Dataand Starving for Information
Drowning in Data and Starving for Information
Concept Searching, Inc
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint Webinar
Concept Searching, Inc
 
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarEliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Concept Searching, Inc
 
Using Metadata-Driven Taxonomies to Solve Business Problems
Using Metadata-Driven Taxonomies to Solve Business ProblemsUsing Metadata-Driven Taxonomies to Solve Business Problems
Using Metadata-Driven Taxonomies to Solve Business Problems
Concept Searching, Inc
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
Cloudera, Inc.
 
Going Meta in SharePoint – Tricks of the Trade
Going Meta in SharePoint – Tricks of the TradeGoing Meta in SharePoint – Tricks of the Trade
Going Meta in SharePoint – Tricks of the Trade
Concept Searching, Inc
 
ARMA NOVA’s Auto-Categorization Showcase
ARMA NOVA’s Auto-Categorization Showcase ARMA NOVA’s Auto-Categorization Showcase
ARMA NOVA’s Auto-Categorization Showcase
Concept Searching, Inc
 
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
BigID Inc
 
-Enrichment - Unlocking the value of data for digital transformation - Big Da...
-Enrichment - Unlocking the value of data for digital transformation - Big Da...-Enrichment - Unlocking the value of data for digital transformation - Big Da...
-Enrichment - Unlocking the value of data for digital transformation - Big Da...
webwinkelvakdag
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
TrustArc
 
Change Your Search to Find – SharePoint and Office 365 Webinar
Change Your Search to Find – SharePoint and Office 365 WebinarChange Your Search to Find – SharePoint and Office 365 Webinar
Change Your Search to Find – SharePoint and Office 365 Webinar
Concept Searching, Inc
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
Ulf Mattsson
 
GDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of GraphsGDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of Graphs
Neo4j
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
Kellyn Pot'Vin-Gorman
 
No AI Without IA: Information Architecture as a Critical Enabler - Dino Eliop...
No AI Without IA: Information Architecture as a Critical Enabler - Dino Eliop...No AI Without IA: Information Architecture as a Critical Enabler - Dino Eliop...
No AI Without IA: Information Architecture as a Critical Enabler - Dino Eliop...
Digital Customer Experience (DX) Summit
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Ulf Mattsson
 
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty ComputationISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
UlfMattsson7
 
Why Most Migration Projects Fail – Don’t Be a Statistic Webinar
Why Most Migration Projects Fail – Don’t Be a Statistic WebinarWhy Most Migration Projects Fail – Don’t Be a Statistic Webinar
Why Most Migration Projects Fail – Don’t Be a Statistic Webinar
Concept Searching, Inc
 
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Zia Consulting
 

Similar to Discovery, Risk, and Insight in a Metadata-Driven World Webinar (20)

Metadata-Driven Cleanup of Files, Content, and Email Webinar
Metadata-Driven Cleanup of Files, Content, and Email WebinarMetadata-Driven Cleanup of Files, Content, and Email Webinar
Metadata-Driven Cleanup of Files, Content, and Email Webinar
 
Drowning in Data and Starving for Information
Drowning in Dataand Starving for InformationDrowning in Dataand Starving for Information
Drowning in Data and Starving for Information
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint Webinar
 
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarEliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches Webinar
 
Using Metadata-Driven Taxonomies to Solve Business Problems
Using Metadata-Driven Taxonomies to Solve Business ProblemsUsing Metadata-Driven Taxonomies to Solve Business Problems
Using Metadata-Driven Taxonomies to Solve Business Problems
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
Going Meta in SharePoint – Tricks of the Trade
Going Meta in SharePoint – Tricks of the TradeGoing Meta in SharePoint – Tricks of the Trade
Going Meta in SharePoint – Tricks of the Trade
 
ARMA NOVA’s Auto-Categorization Showcase
ARMA NOVA’s Auto-Categorization Showcase ARMA NOVA’s Auto-Categorization Showcase
ARMA NOVA’s Auto-Categorization Showcase
 
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
 
-Enrichment - Unlocking the value of data for digital transformation - Big Da...
-Enrichment - Unlocking the value of data for digital transformation - Big Da...-Enrichment - Unlocking the value of data for digital transformation - Big Da...
-Enrichment - Unlocking the value of data for digital transformation - Big Da...
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
Change Your Search to Find – SharePoint and Office 365 Webinar
Change Your Search to Find – SharePoint and Office 365 WebinarChange Your Search to Find – SharePoint and Office 365 Webinar
Change Your Search to Find – SharePoint and Office 365 Webinar
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
GDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of GraphsGDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of Graphs
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
No AI Without IA: Information Architecture as a Critical Enabler - Dino Eliop...
No AI Without IA: Information Architecture as a Critical Enabler - Dino Eliop...No AI Without IA: Information Architecture as a Critical Enabler - Dino Eliop...
No AI Without IA: Information Architecture as a Critical Enabler - Dino Eliop...
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty ComputationISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
 
Why Most Migration Projects Fail – Don’t Be a Statistic Webinar
Why Most Migration Projects Fail – Don’t Be a Statistic WebinarWhy Most Migration Projects Fail – Don’t Be a Statistic Webinar
Why Most Migration Projects Fail – Don’t Be a Statistic Webinar
 
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
 

More from Concept Searching, Inc

Why You Need Metadata-Driven Records Management Webinar
Why You Need Metadata-Driven Records Management WebinarWhy You Need Metadata-Driven Records Management Webinar
Why You Need Metadata-Driven Records Management Webinar
Concept Searching, Inc
 
Using Metadata and Classification in Records Management
Using Metadata and Classification in Records ManagementUsing Metadata and Classification in Records Management
Using Metadata and Classification in Records Management
Concept Searching, Inc
 
FEDSPUG Meeting: Intelligent Metadata and Auto-classification in Records Mana...
FEDSPUG Meeting: Intelligent Metadata and Auto-classification in Records Mana...FEDSPUG Meeting: Intelligent Metadata and Auto-classification in Records Mana...
FEDSPUG Meeting: Intelligent Metadata and Auto-classification in Records Mana...
Concept Searching, Inc
 
Why You Need Intelligent Metadata and Auto-classification in Records Management
Why You Need Intelligent Metadata and Auto-classification in Records ManagementWhy You Need Intelligent Metadata and Auto-classification in Records Management
Why You Need Intelligent Metadata and Auto-classification in Records Management
Concept Searching, Inc
 
Going Meta – How to use Metadata in SharePoint
Going Meta – How to use Metadata in SharePointGoing Meta – How to use Metadata in SharePoint
Going Meta – How to use Metadata in SharePoint
Concept Searching, Inc
 
Why You Need Intelligent Metadata and Auto-classification in Records Management
Why You Need Intelligent Metadata and Auto-classification in Records ManagementWhy You Need Intelligent Metadata and Auto-classification in Records Management
Why You Need Intelligent Metadata and Auto-classification in Records Management
Concept Searching, Inc
 
What You Don’t Know May Hurt You – Achieving Insight and Knowledge Discovery
What You Don’t Know May Hurt You – Achieving Insight and Knowledge DiscoveryWhat You Don’t Know May Hurt You – Achieving Insight and Knowledge Discovery
What You Don’t Know May Hurt You – Achieving Insight and Knowledge Discovery
Concept Searching, Inc
 
Going Meta – How to Use Metadata in SharePoint and Office 365
Going Meta – How to Use Metadata in SharePoint and Office 365Going Meta – How to Use Metadata in SharePoint and Office 365
Going Meta – How to Use Metadata in SharePoint and Office 365
Concept Searching, Inc
 
SharePoint Saturday Toronto - Going Meta – How to Use Metadata in SharePoint ...
SharePoint Saturday Toronto - Going Meta – How to Use Metadata in SharePoint ...SharePoint Saturday Toronto - Going Meta – How to Use Metadata in SharePoint ...
SharePoint Saturday Toronto - Going Meta – How to Use Metadata in SharePoint ...
Concept Searching, Inc
 
SharePoint Saturday London - The Nuts and Bolts of Metadata Tagging and Taxon...
SharePoint Saturday London - The Nuts and Bolts of Metadata Tagging and Taxon...SharePoint Saturday London - The Nuts and Bolts of Metadata Tagging and Taxon...
SharePoint Saturday London - The Nuts and Bolts of Metadata Tagging and Taxon...
Concept Searching, Inc
 
ECM or CLM? A Fight to the Finish Webinar
ECM or CLM? A Fight to the Finish WebinarECM or CLM? A Fight to the Finish Webinar
ECM or CLM? A Fight to the Finish Webinar
Concept Searching, Inc
 
ARMA Calgary Spring Seminar: The Nuts and Bolts of Metadata Tagging and Taxon...
ARMA Calgary Spring Seminar: The Nuts and Bolts of Metadata Tagging and Taxon...ARMA Calgary Spring Seminar: The Nuts and Bolts of Metadata Tagging and Taxon...
ARMA Calgary Spring Seminar: The Nuts and Bolts of Metadata Tagging and Taxon...
Concept Searching, Inc
 
Collaboration Can Be Dangerous Webinar
Collaboration Can Be Dangerous WebinarCollaboration Can Be Dangerous Webinar
Collaboration Can Be Dangerous Webinar
Concept Searching, Inc
 
Groundbreaking and Game-changing Enterprise Search Webinar
Groundbreaking and Game-changing Enterprise Search WebinarGroundbreaking and Game-changing Enterprise Search Webinar
Groundbreaking and Game-changing Enterprise Search Webinar
Concept Searching, Inc
 
The Nuts and Bolts of Metadata Tagging and Taxonomies Made Easy Webinar
The Nuts and Bolts of Metadata Tagging and Taxonomies Made Easy WebinarThe Nuts and Bolts of Metadata Tagging and Taxonomies Made Easy Webinar
The Nuts and Bolts of Metadata Tagging and Taxonomies Made Easy Webinar
Concept Searching, Inc
 
SharePoint and Office 365 State of the Market Survey Results Webinar
SharePoint and Office 365 State of the Market Survey Results WebinarSharePoint and Office 365 State of the Market Survey Results Webinar
SharePoint and Office 365 State of the Market Survey Results Webinar
Concept Searching, Inc
 
Coexist or Integrate? Manage Unstructured Content from Diverse Repositories a...
Coexist or Integrate? Manage Unstructured Content from Diverse Repositories a...Coexist or Integrate? Manage Unstructured Content from Diverse Repositories a...
Coexist or Integrate? Manage Unstructured Content from Diverse Repositories a...
Concept Searching, Inc
 
The Value of Adding Managed Metadata to Microsoft Online Search
The Value of Adding Managed Metadata to Microsoft Online SearchThe Value of Adding Managed Metadata to Microsoft Online Search
The Value of Adding Managed Metadata to Microsoft Online Search
Concept Searching, Inc
 
Exploring Automatic Metadata Generation Based on SharePoint Term Sets
Exploring Automatic Metadata Generation Based on SharePoint Term SetsExploring Automatic Metadata Generation Based on SharePoint Term Sets
Exploring Automatic Metadata Generation Based on SharePoint Term Sets
Concept Searching, Inc
 
How To Implement Engineering Search Within Your Organization Webinar
How To Implement Engineering Search Within Your Organization WebinarHow To Implement Engineering Search Within Your Organization Webinar
How To Implement Engineering Search Within Your Organization Webinar
Concept Searching, Inc
 

More from Concept Searching, Inc (20)

Why You Need Metadata-Driven Records Management Webinar
Why You Need Metadata-Driven Records Management WebinarWhy You Need Metadata-Driven Records Management Webinar
Why You Need Metadata-Driven Records Management Webinar
 
Using Metadata and Classification in Records Management
Using Metadata and Classification in Records ManagementUsing Metadata and Classification in Records Management
Using Metadata and Classification in Records Management
 
FEDSPUG Meeting: Intelligent Metadata and Auto-classification in Records Mana...
FEDSPUG Meeting: Intelligent Metadata and Auto-classification in Records Mana...FEDSPUG Meeting: Intelligent Metadata and Auto-classification in Records Mana...
FEDSPUG Meeting: Intelligent Metadata and Auto-classification in Records Mana...
 
Why You Need Intelligent Metadata and Auto-classification in Records Management
Why You Need Intelligent Metadata and Auto-classification in Records ManagementWhy You Need Intelligent Metadata and Auto-classification in Records Management
Why You Need Intelligent Metadata and Auto-classification in Records Management
 
Going Meta – How to use Metadata in SharePoint
Going Meta – How to use Metadata in SharePointGoing Meta – How to use Metadata in SharePoint
Going Meta – How to use Metadata in SharePoint
 
Why You Need Intelligent Metadata and Auto-classification in Records Management
Why You Need Intelligent Metadata and Auto-classification in Records ManagementWhy You Need Intelligent Metadata and Auto-classification in Records Management
Why You Need Intelligent Metadata and Auto-classification in Records Management
 
What You Don’t Know May Hurt You – Achieving Insight and Knowledge Discovery
What You Don’t Know May Hurt You – Achieving Insight and Knowledge DiscoveryWhat You Don’t Know May Hurt You – Achieving Insight and Knowledge Discovery
What You Don’t Know May Hurt You – Achieving Insight and Knowledge Discovery
 
Going Meta – How to Use Metadata in SharePoint and Office 365
Going Meta – How to Use Metadata in SharePoint and Office 365Going Meta – How to Use Metadata in SharePoint and Office 365
Going Meta – How to Use Metadata in SharePoint and Office 365
 
SharePoint Saturday Toronto - Going Meta – How to Use Metadata in SharePoint ...
SharePoint Saturday Toronto - Going Meta – How to Use Metadata in SharePoint ...SharePoint Saturday Toronto - Going Meta – How to Use Metadata in SharePoint ...
SharePoint Saturday Toronto - Going Meta – How to Use Metadata in SharePoint ...
 
SharePoint Saturday London - The Nuts and Bolts of Metadata Tagging and Taxon...
SharePoint Saturday London - The Nuts and Bolts of Metadata Tagging and Taxon...SharePoint Saturday London - The Nuts and Bolts of Metadata Tagging and Taxon...
SharePoint Saturday London - The Nuts and Bolts of Metadata Tagging and Taxon...
 
ECM or CLM? A Fight to the Finish Webinar
ECM or CLM? A Fight to the Finish WebinarECM or CLM? A Fight to the Finish Webinar
ECM or CLM? A Fight to the Finish Webinar
 
ARMA Calgary Spring Seminar: The Nuts and Bolts of Metadata Tagging and Taxon...
ARMA Calgary Spring Seminar: The Nuts and Bolts of Metadata Tagging and Taxon...ARMA Calgary Spring Seminar: The Nuts and Bolts of Metadata Tagging and Taxon...
ARMA Calgary Spring Seminar: The Nuts and Bolts of Metadata Tagging and Taxon...
 
Collaboration Can Be Dangerous Webinar
Collaboration Can Be Dangerous WebinarCollaboration Can Be Dangerous Webinar
Collaboration Can Be Dangerous Webinar
 
Groundbreaking and Game-changing Enterprise Search Webinar
Groundbreaking and Game-changing Enterprise Search WebinarGroundbreaking and Game-changing Enterprise Search Webinar
Groundbreaking and Game-changing Enterprise Search Webinar
 
The Nuts and Bolts of Metadata Tagging and Taxonomies Made Easy Webinar
The Nuts and Bolts of Metadata Tagging and Taxonomies Made Easy WebinarThe Nuts and Bolts of Metadata Tagging and Taxonomies Made Easy Webinar
The Nuts and Bolts of Metadata Tagging and Taxonomies Made Easy Webinar
 
SharePoint and Office 365 State of the Market Survey Results Webinar
SharePoint and Office 365 State of the Market Survey Results WebinarSharePoint and Office 365 State of the Market Survey Results Webinar
SharePoint and Office 365 State of the Market Survey Results Webinar
 
Coexist or Integrate? Manage Unstructured Content from Diverse Repositories a...
Coexist or Integrate? Manage Unstructured Content from Diverse Repositories a...Coexist or Integrate? Manage Unstructured Content from Diverse Repositories a...
Coexist or Integrate? Manage Unstructured Content from Diverse Repositories a...
 
The Value of Adding Managed Metadata to Microsoft Online Search
The Value of Adding Managed Metadata to Microsoft Online SearchThe Value of Adding Managed Metadata to Microsoft Online Search
The Value of Adding Managed Metadata to Microsoft Online Search
 
Exploring Automatic Metadata Generation Based on SharePoint Term Sets
Exploring Automatic Metadata Generation Based on SharePoint Term SetsExploring Automatic Metadata Generation Based on SharePoint Term Sets
Exploring Automatic Metadata Generation Based on SharePoint Term Sets
 
How To Implement Engineering Search Within Your Organization Webinar
How To Implement Engineering Search Within Your Organization WebinarHow To Implement Engineering Search Within Your Organization Webinar
How To Implement Engineering Search Within Your Organization Webinar
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

Discovery, Risk, and Insight in a Metadata-Driven World Webinar

  • 1. © Concept Searching 2018 Discovery, Risk, and Insight in a Metadata-Driven World www.conceptsearching.com marketing@conceptsearching.com Twitter @conceptsearch Ilia Sotnikov VP Product Management Netwrix www.netwrix.com Jeff Melnick Manager Sales Engineering Netwrix www.netwrix.com Robert Piddocke VP Channel and Business Development Concept Searching
  • 2. © Concept Searching 2018 Participants Jeff Melnick – Manager Sales Engineering at Netwrix has over 15 years of experience in the IT field performing Active Directory and systems migrations, integrations, and installations. Ilia Sotnikov – VP Product Management at Netwrix is responsible for product vision and strategy, and has over 15 years of experience in IT management in the software market. Robert Piddocke – VP Channel and Business Development at Concept Searching has over 15 years of business development experience, implemented hundreds of search solutions, and authored books on SharePoint Search.
  • 3. © Concept Searching 2018 Agenda • Who we are and what we do • The importance of metadata • Risk of data ignorance • Solution • Demos • How can we help?
  • 4. © Concept Searching 2018 • Company founded in 2002 • Product launched in 2003 • Focus on management of structured and unstructured information • Profitable, debt free • Technology Platform • Delivered as a web service • Automatic concept identification, content tagging, auto-classification, taxonomy management • Only statistical vendor that can extract conceptual metadata • 9 years KMWorld ‘100 Companies that Matter in Knowledge Management’ 9 years KMWorld ‘Trend Setting Product’ • Authority to Operate enterprise wide US Air Force, NETCON US Army, and Canadian SLSA • Client base: Fortune 500/1000 organizations in Healthcare, Financial Services, Manufacturing, Energy, Professional Services, Pharmaceutical, Public sector and DoD • Microsoft Gold Certification in Application Development • Member of SharePoint PAC and TAP programs • Suitable for all versions of SharePoint on-premises and SharePoint Online, including the vNext dedicated platform and the government cloud Who Is Concept Searching?
  • 5. © Concept Searching 2018 Who Is Netwrix? Year of foundation: 2006 Headquarters location: Irvine, California Global customer base: Over 9,000 Customer support: Global 24/5 support with 97% customer satisfaction Recognition: Among the fastest growing software companies in the US, with more than 140 industry awards from Redmond Magazine, SC Magazine, Windows IT Pro and others
  • 6. © Concept Searching 2018 About Netwrix Auditor A visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations, and access in hybrid IT environments It provides security intelligence to identify security holes, detect anomalies in user behavior, and investigate threat patterns in time to prevent real damage Netwrix Auditor
  • 7. © Concept Searching 2018 Increase the Productivity of Security and Operations Teams Netwrix Auditor Benefits Pass Compliance Audits with Less Effort and Expense Detect Data Security Threats, both On Premises and in the Cloud
  • 8. © Concept Searching 2018 Compound Term Processing, Classification, and Taxonomy Management 8
  • 9. © Concept Searching 2018 What Does Metadata Impact?
  • 10. © Concept Searching 2018 What Is the Cost of Poor Metadata?
  • 11. © Concept Searching 2018 How much organizational risk is acceptable?
  • 12. © Concept Searching 2018 Data Security Challenges of respondents say they need up to 50% more cybersecurity budget 87% of respondents consider a careless member of staff to be the most likely source of attack 77% of boards have sufficient cybersecurity knowledge for effective oversight of cyber risks 36% of organizations still keep cybersecurity reporting mostly within the IT function 63% feel it is very likely they would detect a sophisticated cyber attack 12% say their cybersecurity function does not fully meet their organization’s needs 89% Source: Cybersecurity regained: preparing to face cyber attacks – EY Global Information Security Survey 2017-18
  • 13. © Concept Searching 2018 Unstructured Data Security ? ? ? ? ? ? ? ? ? ? ? ? • Do you store terabytes of data on your file shares? • Do you know which of that data needs to be protected? • Are you sure there are no critical assets in unsecure locations? • Do you know who has access to sensitive files? • Can you bring down the risk?
  • 15. © Concept Searching 2018 Where is My Sensitive Data Located? Gaining a high-level view of the sensitive data you store Discovering sensitive data stored outside of a secure location Prioritizing efforts and spending on the most critical assets first
  • 16. © Concept Searching 2018 Who Has Access to the Sensitive Files? Identifying owners of sensitive data Streamlining attestations of access rights to sensitive data Finding overexposed pieces of sensitive data
  • 17. © Concept Searching 2018 Is There Any Unauthorized Activity? Detecting unauthorized activity around your sensitive data
  • 18. © Concept Searching 2018 What About Compliance? Accommodating new data security regulations Proving the effectiveness of your data security controls to auditors Determining the severity of a data breach
  • 19. © Concept Searching 2018 Out-of-the-box Classification Rules • General Data Protection Regulation (GDPR) • GDPR prohibited records • Health Insurance Portability and Accountability Act (HIPAA) • Gramm-Leach-Bliley Act (GLBA) • Payment Card Industry Data Security Standard (PCI DSS) • Personally Identifiable Information (PII) • Protected Health Information (PHI) • Generic finance records
  • 20. © Concept Searching 2018 Introduction to Netwrix Auditor Data Discovery and Classification
  • 21. © Concept Searching 2018 Metadata and Classification An Ounce of Prevention is Worth a Pound of Cure • Cybersecurity • Data breaches • Noncompliance • Information governance • GDPR • Secure collaboration • Intelligent migration • Protection of confidential information • Business-critical • eDiscovery • Legal holds • Archival • Social media • Email
  • 22. © Concept Searching 2018 “52% of all information currently stored and processed by organizations around the world is considered ‘dark’ data, whose value is unknown.” “Another 33% of data is considered redundant, obsolete, or trivial (ROT) and is known to be useless.” Global Databerg Report
  • 23. © Concept Searching 2018 The Egg Does Come Before the Chicken Content Optimization • You have to find your data before you can protect or act on it • Evaluate the integrity of the data • Is it trustworthy? • Redundant, stale, obsolete, dupes and near dupes, plain old garbage – grocery list, office party photos • What type of data – unstructured, semi-structured, structured, or a mix? • Archive/delete • Volatility of data • Real-time monitoring and/or workflows? • Ongoing management of taxonomies • Centralized control – metadata repository • What do you want to do with the data?
  • 24. © Concept Searching 2018 • Automated metadata generation is difficult to achieve consistently with high precision and recall • Many products on the market today require complex rules to be generated, often involving search syntax and complicated Boolean expressions • Some products claim use of AI and NLP, but in reality are proximity and keyword • Some require a document training set for every term to be processed • Some of these products employ linguistic techniques that will not perform consistently across different vertical markets, and are typically not scalable Result is a very high initial cost in terms of time and qualified staff Precision Versus Recall
  • 25. © Concept Searching 2018 Automating Data Discovery and Classification
  • 26. © Concept Searching 2018 How Can We Help? • Requirements discussion • Demonstration • Proof of Concept • Please contact us via our website for additional information or to request a demo
  • 28. © Concept Searching 2018 Next Webinar in Metadata-Driven World Series Getting Lost in Semantics – Selecting the Right Search Engine Wednesday, September 12, 2018 Register The definition of semantics can vary, depending on who is using it. Add to that artificial intelligence and natural language processing, and you may find that search has become quite complicated. Join us as we take the mystery and confusion out of search. Discover which technologies work, which don’t, and why. Read more and register in the Upcoming Webinars area of our website.
  • 29. © Concept Searching 2018 Thank You www.conceptsearching.com marketing@conceptsearching.com Twitter @conceptsearch Ilia Sotnikov VP Product Management Netwrix www.netwrix.com Jeff Melnick Manager Sales Engineering Netwrix www.netwrix.com Robert Piddocke VP Channel and Business Development Concept Searching