主页
所有资源
Consilio 高阶学院

Practice Guide: An Ounce of Prevention: Fundamentals of Data Protection

Written by Annie Malloy

Updated: Jan 29, 2024

Authors

Jonathan Fowler

Chief Information Security Officer

About Author

Jonathan Fowler currently serves as Vice President and CISO for Consilio.  He is a Subject Matter Expert (SME) in the fields of Electronic Discovery and Digital Forensics and advises clients on all aspects of the Electronic Discovery Reference Model (EDRM) from effective information governance strategies through document production and presentation. He previously headed up Consilio’s global Digital Forensics team, overseeing all data preservation, collection, and forensic examination operations, including the allocation of human and technology resources at the matter level, also serving as the driving force behind the growth and strategic direction of the department. He has experience as an expert witness in Computer Forensics in both Federal and state courts, and has also prepared multiple expert reports, affidavits, and statements of fact for various clients. Additionally, Jonathan serves as Adjunct Professor in the graduate program in Computer Forensics at George Mason University, teaching courses in Windows Registry Forensics, as well as the capstone Advanced Computer Forensics course.

Matthew Verga, Esq.

Director of Education

About Author

Matthew Verga is an attorney, consultant, and eDiscovery expert proficient at leveraging his legal experience, his technical knowledge, and his communication skills to make complex eDiscovery topics accessible to diverse audiences. A fifteen-year industry veteran, Matthew has worked across every phase of the EDRM and at every level, from the project trenches to enterprise program design. As Director of Education for Consilio, he leverages this background to produce engaging educational content to empower practitioners at all levels with knowledge they can use to improve their projects, their careers, and their organizations.

More from the author

Summary

It is axiomatic that the volumes of electronically-stored information (ESI) generated by organizations are vast and ever-increasing. Correspondingly, the amount of ESI that must be preserved, collected, processed, and reviewed for internal investigations, active litigation, and regulatory compliance never stops growing. Today, it is a practical and ethical requirement for practitioners in these areas to take the necessary steps to protect the ESI they are managing for those purposes, which means keeping up with evolving security and compliance best practices – as well as adapting to the rapidly changing tactics to threat actors. In this practice guide, we will discuss why ESI must be protected and how you can protect it, including fundamentals of security compliance frameworks, role-based access control, cloud storage vs. on-premises storage, and data encryption.

In this Practice Guide

  • The relative merits of common security compliance frameworks
  • The pros and cons of cloud and on-premises storage environments
  • The essential need for data encryption at rest and in transit

Key Insights

  • The need for everyone to contribute to data protection
  • The critical importance of role-based access control
  • The need to adapt to evolving threat tactics

Summary

It is axiomatic that the volumes of electronically-stored information (ESI) generated by organizations are vast and ever-increasing. Correspondingly, the amount of ESI that must be preserved, collected, processed, and reviewed for internal investigations, active litigation, and regulatory compliance never stops growing. Today, it is a practical and ethical requirement for practitioners in these areas to take the necessary steps to protect the ESI they are managing for those purposes, which means keeping up with evolving security and compliance best practices – as well as adapting to the rapidly changing tactics to threat actors. In this practice guide, we will discuss why ESI must be protected and how you can protect it, including fundamentals of security compliance frameworks, role-based access control, cloud storage vs. on-premises storage, and data encryption.

In this Practice Guide

  • The relative merits of common security compliance frameworks
  • The pros and cons of cloud and on-premises storage environments
  • The essential need for data encryption at rest and in transit

Key Insights

  • The need for everyone to contribute to data protection
  • The critical importance of role-based access control
  • The need to adapt to evolving threat tactics

Fill out the form below to download the complete insight.

Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Romania
Russian Federation
Rwanda
Réunion
Saint Barthélemy
Saint Helena, Ascension and Tristan da Cunha
Saint Kitts and Nevis
Saint Lucia
Saint Martin (French part)
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Sign up for Consilio updates

不管怎么样,我们都很友善,祝你好运。在悲惨的情绪中,人们对各种各样的恐惧感情有独钟的感觉。
谢谢!您提交的内容已收到!
单击 “注册” 即表示您确认您同意我们的 隐私政策
哎哟!提交表单时出了点问题。