February 13, 2025 – Member meeting: Data Security Posture Management – 5 Considerations for Success | Breaches are Inevitable, Damage Isn’t

Registration required: February 13, 2025 – 7:00pm – 9:00pm Pacific Time | 2 CPEs

Session One – Data Security Posture Management (DSPM) – 5 Considerations for Success

Dimitri Sirota from BigID will join us to discuss the Critical Capabilities of DSPM, with an overview of necessary components every security and risk leader must consider for an effective program of Data Security Posture Management:

  • Find, classify, and map sensitive data across your environment
  • Discover dark data, shadow data, and unknown data
  • Identify potential access & exposure risks
  • Alert on high-risk vulnerabilities and critical issues
  • Easily report and assess risk
Connect with Dimitri on LinkedIn

Dimitri Sirota is the CEO and co-founder of BigID: the leader in data security, compliance, privacy, and AI data management. He’s a leading industry expert in AI, security, and identity, and is an established (serial) entrepreneur, investor, mentor, and strategist. Dimitri previously founded two enterprise software companies focused on security (eTunnels) and API management (Layer 7 Technologies) which was sold to CA Technologies in 2013.

BigID is a leader in data security, privacy, compliance, and governance: enabling organizations to proactively discover, manage, protect, and get more value from their data in a single platform for data visibility and control. Customers use BigID to reduce their data risk, automate security and privacy controls, achieve compliance, and understand their data across their entire data landscape: including multicloud, hybrid cloud, IaaS, PaaS, SaaS, and on-prem data sources.

BigID has been recognized by CNBC as one of the top 25 startups for the enterprise, has been named to the Inc 5000 and Deloitte 500 for two years in a row, and is the leading modern data security vendor in the market today.

Session Two – Breaches are Inevitable, Damage Isn’t

We will focus the topic on how malware can still get through all the current perimeter solutions, and once they do that, they can go wherever they want. The key to limiting the scope of a breach is restricting what that malware can access and ensuring that all lateral movement is just as secured as your perimeter security.

Connect with Christer on LinkedIn

Christer Swartz, Director of Industry Solutions at Illumio. Christer’s security career journey began at a small startup called Cisco and continued at Netflix and Palo Alto Networks. He has focused on industry-specific security challenges affecting platform integrations, from Cloud-managed Kubernetes to Data Center mainframes.

Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface.

Related Posts