You are on page 1of 13

Practical approaches to protecting data in a complex modern enterprise |... https://www.dxc.technology/security/insights/150108-practical_approac...

Practical approaches to protecting data in a


complex modern enterprise

We use cookies on our website to provide you the best experience possible. Cookies are small snippets of data
stored on your computer. These cookies are used to help operate our site and for analytics purposes. They also ❯ Cookie Settings
help us remember you so we can show you more relevant content. Learn more about our cookies

1 of 13 4/15/2021, 8:28 AM
Practical approaches to protecting data in a complex modern enterprise |... https://www.dxc.technology/security/insights/150108-practical_approac...

Legal and regulatory environment

We use cookies on our website to provide you the best experience possible. Cookies are small snippets of data
stored on your computer. These cookies are used to help operate our site and for analytics purposes. They also ❯ Cookie Settings
help us remember you so we can show you more relevant content. Learn more about our cookies

2 of 13 4/15/2021, 8:28 AM
Practical approaches to protecting data in a complex modern enterprise |... https://www.dxc.technology/security/insights/150108-practical_approac...

Cyberthreat landscape

Figure 1

We use cookies on our website to provide you the best experience possible. Cookies are small snippets of data
stored on your computer. These cookies are used to help operate our site and for analytics purposes. They also ❯ Cookie Settings
help us remember you so we can show you more relevant content. Learn more about our cookies

3 of 13 4/15/2021, 8:28 AM
Practical approaches to protecting data in a complex modern enterprise |... https://www.dxc.technology/security/insights/150108-practical_approac...

Figure 1

Figure 2

Figure 2

We use cookies on our website to provide you the best experience possible. Cookies are small snippets of data
stored on your computer. These cookies are used to help operate our site and for analytics purposes. They also ❯ Cookie Settings
help us remember you so we can show you more relevant content. Learn more about our cookies

4 of 13 4/15/2021, 8:28 AM
Practical approaches to protecting data in a complex modern enterprise |... https://www.dxc.technology/security/insights/150108-practical_approac...

Use compliance as an opportunity to protect data

We use cookies on our website to provide you the best experience possible. Cookies are small snippets of data
stored on your computer. These cookies are used to help operate our site and for analytics purposes. They also ❯ Cookie Settings
help us remember you so we can show you more relevant content. Learn more about our cookies

5 of 13 4/15/2021, 8:28 AM
Practical approaches to protecting data in a complex modern enterprise |... https://www.dxc.technology/security/insights/150108-practical_approac...

Adopt platform-agnostic security solutions

We use cookies on our website to provide you the best experience possible. Cookies are small snippets of data
stored on your computer. These cookies are used to help operate our site and for analytics purposes. They also ❯ Cookie Settings
help us remember you so we can show you more relevant content. Learn more about our cookies

6 of 13 4/15/2021, 8:28 AM
Practical approaches to protecting data in a complex modern enterprise |... https://www.dxc.technology/security/insights/150108-practical_approac...

Clearly define data owners

Deal with vulnerabilities and ongoing threats

We use cookies on our website to provide you the best experience possible. Cookies are small snippets of data
stored on your computer. These cookies are used to help operate our site and for analytics purposes. They also ❯ Cookie Settings
help us remember you so we can show you more relevant content. Learn more about our cookies

7 of 13 4/15/2021, 8:28 AM
Practical approaches to protecting data in a complex modern enterprise |... https://www.dxc.technology/security/insights/150108-practical_approac...

Adopt data access management: Real-time monitoring for privileged access

Implement automated detection and protection as a strategy

We use cookies on our website to provide you the best experience possible. Cookies are small snippets of data
stored on your computer. These cookies are used to help operate our site and for analytics purposes. They also ❯ Cookie Settings
help us remember you so we can show you more relevant content. Learn more about our cookies

8 of 13 4/15/2021, 8:28 AM
Practical approaches to protecting data in a complex modern enterprise |... https://www.dxc.technology/security/insights/150108-practical_approac...

Employ ‘smart’ (AI and ML) approaches to protecting data on-premises and in the cloud.

Adopt policy-based, converged, cloud-delivered, secure access service edge

We use cookies on our website to provide you the best experience possible. Cookies are small snippets of data
stored on your computer. These cookies are used to help operate our site and for analytics purposes. They also ❯ Cookie Settings
help us remember you so we can show you more relevant content. Learn more about our cookies

9 of 13 4/15/2021, 8:28 AM
Practical approaches to protecting data in a complex modern enterprise |... https://www.dxc.technology/security/insights/150108-practical_approac...

Simon Arnell

Bex (Hirdman) Nitert

We use cookies on our website to provide you the best experience possible. Cookies are small snippets of data
stored on your computer. These cookies are used to help operate our site and for analytics purposes. They also ❯ Cookie Settings
help us remember you so we can show you more relevant content. Learn more about our cookies

10 of 13 4/15/2021, 8:28 AM
Practical approaches to protecting data in a complex modern enterprise |... https://www.dxc.technology/security/insights/150108-practical_approac...

Alex Kreychman

SECURITY HOME

SERVICES & SOLUTIONS

CASE STUDIES

INSIGHTS

DOWNLOAD THE PAPER

STAY INFORMED OF THE LATEST INSIGHTS FROM DXC

CONTACT US

Learn more

5 key trends that will impact cyber security in 2021

Security Threat Intelligence Report

Recommended for You

Harnessing the Power of Clinical Data

The New Digital Workplace Is Contextual

Four Factors Creating a Perfect Storm in the Insurance Industry


We use cookies on our website to provide you the best experience possible. Cookies are small snippets of data
stored on your computer. These cookies are used to help operate our site and for analytics purposes. They also ❯ Cookie Settings
help us remember you so we can show you more relevant content. Learn more about our cookies

11 of 13 4/15/2021, 8:28 AM
Practical approaches to protecting data in a complex modern enterprise |... https://www.dxc.technology/security/insights/150108-practical_approac...

We use cookies on our website to provide you the best experience possible. Cookies are small snippets of data
stored on your computer. These cookies are used to help operate our site and for analytics purposes. They also ❯ Cookie Settings
help us remember you so we can show you more relevant content. Learn more about our cookies

12 of 13 4/15/2021, 8:28 AM
Practical approaches to protecting data in a complex modern enterprise |... https://www.dxc.technology/security/insights/150108-practical_approac...

NEXT

We use cookies on our website to provide you the best experience possible. Cookies are small snippets of data
stored on your computer. These cookies are used to help operate our site and for analytics purposes. They also ❯ Cookie Settings
help us remember you so we can show you more relevant content. Learn more about our cookies

13 of 13 4/15/2021, 8:28 AM

You might also like