As the extent and complexity of cybersecurity risk increases, the Continuous Diagnostic and Mitigation program (CDM) has the daunting task of enabling federal departments to store, provide access to and track sensitive data leveraging a set of commercial off-the-shelf (COTS) tools. Many of these tools protect the perimeter and provide robust monitoring, but that is no longer enough. The data target must be secured and administered by the data owner. Join this on-demand training as we explore technology enablers that:
- Address DHS’s CDM Phase II program requirements concerning user activities, access and securing data-at-rest throughout the enterprise.
- Enable an enterprise wide approach to data security whether that data is in the cloud, data center, or autonomous servers.
- Provide monitoring and auditing of user actions with data-at-rest, including the ability to block access and deliver intelligence on attempts to access.
- Support organizational initiatives (big data, hybrid cloud) where critical data could be breached.
James Quinn, Lead System Engineer CDM Program, Department of Homeland Security
Wayne Lewandowski, Area Vice President, Federal, Vormetric
Want more information? Check out the top resources on data security: