Abstract
Many enterprises face the task of implementing data protection and datasecurity measures to meet a wide range of legal, regulator, and/or duediligence requirements. Increasingly, these requirements are being appliedto the storage layer, so it is important to understand the areas of mostrisk. In addition, understanding the differences between compliance andsecuring the data can be critical when information systems (IS) auditors areinspecting the storage ecosystem, looking for things like accountability,traceability, and proofs of encryption and destruction.
This session lays a foundation for you to better understand storagesecurity risks, and their mitigation strategies. We will examine commonsecurity mistakes and challenges, including encryption and its impacts ondisaster recovery and business continuity. Finally, we will provide specificrecommendations and offer insights into emerging storage securitymeasures.
After completing this tutorial, you should be able to:
Know storage security measures in response to risk and threat
Understand storage security technologies including encryption, logging, and key management
Understand the upfront and continuing effort required to secure the storage layer