Getting Unstructured Data Under Control for Security and Compliance

Webinar Registration

In this real-training-for-free™ I will take you on an advanced tour of how permissions, roles and inheritance work in both SharePoint and NTFS file systems. It’s so important to understand how all of these objects work together in order to control access to unstructured data. After all, many of the data theft incidents occurring today are about unstructured data in documents and files like PDF, Excel and Word.
In this fast paced session I will explain the interplay of all the objects related to SharePoint access control:
  • Site Collections
  • Sites and Subsites
  • Libraries
  • Folders
  • Documents
At each level I’ll show how permissions and inheritance work. We’ll also explain the difference between:
  • Active Directory groups
  • SharePoint Groups
  • SharePoint Roles
File systems are a bit easier. We’ll discuss:
  • Shares
  • Share permissions
  • Folders
  • Folder/file permissions
Permission inheritance works very different between these 2 environments and we’ll make sure you understand how.
But this technical information, as interesting as it is, is just half the story. Permissions only work if you know where your documents are, who the decision-maker data owners should be and have the right workflows in place. Unstructured data is growing at a terrific rate and most organizations are having a tough time controlling it. That’s why we’ll transition into a higher level discussion of how to get control of unstructured data. I’ll briefly outline a 4-step process:
    1. Collect policies
We’ll explore how to collect relevant information security classification, compliance regulations and retention policies. I’ll provide sample 3-level classification scheme to start with.
    2. Identify unstructured data collections
I’ll provide a quantitative way to identify all of the unstructured data in your organization whether it’s in SharePoint, file-systems or the cloud.
    3. Classify unstructured data
Here we’ll look at how to identify the right “data owner” and assign the right policies to fit each data classification.
    4. Establish and maintain control
The Control phase is the termination of this initial project as you reach it for each unstructured data collection but Control is also the beginning of an ongoing cycle for controlling unstructured data
Even though these policies are presented in sequence, there is plenty of opportunity for concurrent effort. For instance, you can safely work on collecting policy and identifying unstructured data at the same time. Once you have identified a given collection of unstructured data and have all the policies relevant to it, you can proceed to the classification stage for that collection and even implement controls on it.
At the end of the webinar I’ll give you a new whitepaper I’ve written that lays out this process in greater detail. This webinar is made possible by STEALTHbits who provide critical but affordable technology for automating the significant drudgery in projects like this. Don’t miss this practical real-training-for-free™ event. Please register now!
First Name:   
Last Name:   
Work Email:  
Job Title:  

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us and the sponsor.



Additional Resources