The Data Management Institute is pleased to join with Virtualization Review to host its third training and certification program, this time addressing best practices for creating a Data Protection and Data Security (Privacy) strategy.
This training course will examine the two topics that are front of mind for virtually all business IT planners: creating a viable information security strategy in an era of phishing and ransomware, and strengthening disaster avoidance and data protection capabilities. Truth be told, the topics have always been closely intertwined despite the artificial separation between the disciplines of data asset protection and information security provisioning.
Taking on the challenges from the perspective of data management, DMI offers a hybrid solution to protecting data and ensuring its privacy and security.
The Certified Data Security Specialist (CDSS) workshop will comprise six sessions:
Session 1: The Changing Attack Surface of IT and How IT Requires a Comprehensive Data Protection and Information Security Strategy
This session will cover the changing requirements for data protection and security in an increasingly interconnected, mobile and cloud-ified world. A case will be made that technologies such as virtualization, Internet of Things, mobile commerce, and cloud service delivery have increased, rather than diminished, the vulnerability of organizations to unplanned interruption events stemming from both natural and man-made hazards.
Session 2: Together at Last – Data Protection/Disaster Recovery Planning and Information Security (DR/IS) Planning
This session presents a collaborative approach and unified model for data protection planning that combines techniques for addressing interruption events (commonly thought of as disasters) and information security threats.
Session 3: Know thy Data – Analyzing the Threat and Identifying Assets at Risk
This session covers the all-important pre-planning tasks of DR/IS planning, including the characterization and classification of data assets to determine what is at risk, various methods to quantify risk itself, and how to establish priorities for protection and restoral.
Session 4: Elements of an Information Security Strategy
This session peels back the layers of defense in depth strategies for information security. We will look at the security processes that are involved in defending data assets that are at rest in storage repositories and in motion, traversing local, metropolitan, and wide area networks whether in support of hybrid cloud strategies or mobile computing.
Session 5: The Only Way to Protect Data is to Make a Copy
This session surveys data protection techniques that may be part of a multi-layer disaster recovery capability. We will examine the efficacy of different approaches and suggest the best fit of techniques based on asset protection and recovery requirements. We will also review the capabilities and limitations of cloud-based approaches to data protection (such as Backup as a Service and DR as a Service).
Session 6: A Unified Approach, Enabled by Cognitive Data Management
In this session, we will set forth a strategy for integrating DR/IS processes and for applying protection and privacy services in a granular and consistent way, via dynamic data management policies, to all data assets over their useful life using Cognitive Data Management.
Attendees of this event will receive a Certified Information Security Specialist credential from the Data Management Institute, which represents another skills certification that builds toward DMI’s Certified Data Management Architect (CDMA) status.
This course is available on-line at Virtualization Review. Some additional registration is required.