The latest cybersecurity trends, best practices, security vulnerabilities, and more
Data Security - A Hero's Journey
Axel reached out to his Information Security Manager, Binary, to get the back story on DLP. Binary explained that they had no idea what data they were supposed to protect. He also mentioned that out-of-the-box rules from DLP Vendors threw such a massive number of false positives that they couldn’t research any incident.
Axel and Ice Storm meet with the NSKA CDO, Rain Maker.
They discuss the NSKA’s:
- Data Strategy,
- Identifying Trade Secrets,
- The maturity of their Data Governance initiatives, and if they have assigned any roles and responsibilities.
- Building a Data-Driven Culture
Rain Maker mentions that their Data Strategy aims to enhance customer experiences by utilizing a segmentation strategy focused on their Superhero Identity Management System for SIMS Agents.
Working off the Data Governance Org Chart, Ice Storm wants to meet with the Legal/Chief of Compliance/Risk Management Team to review:
- Legal Regulatory Compliance
- Critical Data Elements (CDE)
- Data Risk Assessments
- Data Sharing Agreements
Alouette determined that Secret Superhero Information (SSI) was the highest risk and that we should start with Data Domains that deal with SSI.
Since the SIMS Agents are our most critical Business Unit in our Data Strategy, Ice Storm and Axel Street start with Croix the head of the SIMS Agents department.
They ask how they use sensitive data in their daily operations with a key focus on:
- Where they consume the data
- Where they store the data
- Who they share the data with
Our heroes then interview Depth Charge, the Data Operations Manager, to gain a better understanding of the data in SIMS.To improve policy development, our heroes should clearly understand several data operation processes.
- Data Flow Maps
- Data Storage Types
- Data Operations and Quality Processes
- Metadata Management
- Data Consumers
In Joseph Campbell's original concept of the hero's journey, he outlined several stages that a hero typically goes through, and encountering helpers and mentors is a key part of this process.
Trellix Professional Services is here to assist you in your pursuit of your Data Security initiatives, ensuring optimal results. Throughout this series, we will delve into Axel's journey by exploring components in greater detail through individual episodes.
Dec 7, 2023
Trellix Named 2023 Global Endpoint Security Company of the Year by Frost & Sullivan
Dec 4, 2023
Trellix Extends Virtual Intrusion Prevention System with AWS Gateway Load Balancer
Nov 28, 2023
Board Support Remains Critical as Majority of CISOs Experience Repeat Cyber Attacks
Nov 27, 2023
Trellix Announces Cybersecurity Generative AI Innovations Powered by Amazon Bedrock
Nov 22, 2023
Trellix Hosts Zero Trust Strategy Virtual Forum
The latest from our newsroom
By Harold Rivas · November 28, 2023
Uncover insights from global CISOs on post-cyberattacks strategies in Mind of the CISO: Behind the Breach. Learn proactive defense tactics and the role of XDR.
Is your organization’s data protected from an Alien Symbiont attack? In this episode we’ll dive into how the National Superhero Keeper Agency developed a unique use case to defend against an Insider Threat.
New ransomware attacks occur daily, including Rhysida ransomware. This blog aims to improve defenders' security with insights and detection rules.
Get the latest
We’re no strangers to cybersecurity. But we are a new company.
Stay up to date as we evolve.
Zero spam. Unsubscribe at any time.