Chief Technology Officer
Thales Trusted Cyber Technologies
Whether an organization is addressing CMMC requirements for maturity level 1 or level 5, data protection should be at the core of every cybersecurity strategy. Organizations need to take a data-centric approach to security which means applying protection to the data itself and not solely relying on perimeter protection. Data-centric security focuses on what needs to be protected—the files containing sensitive information—and applying the appropriate form of protection no matter where the data happens to be.
Attend this session to learn how to apply data protection best practices to CMMC. Attendees will learn how to:
- Develop a data-centric security strategy to defend data where it lives and where it begins
- Detect threats and issue alerts
- Address CMMC security controls through encryption, key management and identity and access management