Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust.
As part of the strategy, it is critical for the organization to know what data they have, the characteristics of the data, and what privacy and security requirements are needed to meet the standards for proper data protection. Data Tagging on creation, or import of documentation, will allow the organization to categorize data with a variety of attributes. These attributes can be used in the classification of data for things like Personally identifiable information (PII) and sensitive data. After Data Tagging has been applied, it will enhance protection of data regardless of where the data resides or with whom it is shared.
Come join Mr. Jordan Gottlieb in an exploration on how Data Tagging will provide a more proactive approach to protect data and reduce the risk of data breaches and cyberattacks.