Reactive versus proactive data security

Introduction to Data Security

Angeline Corvaglia

Founder & Digital Transformation Specialist

Acting before or after the fact

arrow pointing left with proactive written on it

  • Prevent breaches from happening
  • Preventative

arrow pointing right with reactive written on it

  • Respond after something occurs
  • After the fact
Introduction to Data Security

Legal requirements versus proactive protection

  icon representing legal requirements

  • Reactive
  • Based on known threats
  • Ignores unique security risks
  • Reacting to requirements

  icon representing proactivity

  • Continuous activity
  • Combat known and unknown threats
  • Stay ahead of the curve
  • Holistic approach
Introduction to Data Security

Ways to be proactive

  Hand planting a seed as a symbol of proactivity

 

  • Voluntary regularity frameworks
  • Technical best practices
  • Regular security audits
  • Check third-party vendors
  • Regular updates and patches
Introduction to Data Security

Common pitfalls

person falling over cliff to represent pitfalls

  • Absence of a clear strategy
  • Inadequate training
  • Underestimation of insider threats
  • Failure to be sufficiently adaptive
  • Neglect of regular audits
Introduction to Data Security

Common pitfalls

person falling over cliff to represent pitfalls

  • Overly complex security measures
  • Insufficient data classification
  • Lack of an incident response plan
  • Reliance solely on processes and technology
  • Failure to update policies
Introduction to Data Security

Having the right mindset

graphic of a person's headshot

Culture of awareness and responsibility

graphic of a person's headshot

Everyone feels responsible...

graphic of a person's headshot

without fear of repercussions

graphic of a person's headshot

Introduction to Data Security

The reactive police department

icon representing a person deleting data

Insufficient security measures

  • Inadequate training in data management
  • Insufficient data retention policies

Proactive approach would have prevented significant damage!

Introduction to Data Security

Let's practice!

Introduction to Data Security

Preparing Video For Download...