{"id":9588,"date":"2020-09-15T10:54:07","date_gmt":"2020-09-15T15:54:07","guid":{"rendered":"https:\/\/ndisac.org\/dibscc\/?post_type=tribe_events&#038;p=9588"},"modified":"2020-09-15T11:15:41","modified_gmt":"2020-09-15T16:15:41","slug":"data-protection-in-the-cloud","status":"publish","type":"tribe_events","link":"https:\/\/ndisac.org\/dibscc\/events\/data-protection-in-the-cloud\/","title":{"rendered":"Data Protection in the Cloud"},"content":{"rendered":"<p>Data protection is a core principle of any security strategy and requires visibility into data-at-rest and data-in-motion for effective data loss protection (DLP) policies and rules. Combine this objective with the overwhelming use of cloud apps freely adopted by business units and users, as well as the increasing number of remote workers and the end result is that you need a modern DLP solution that can scale. As legacy, on premises solutions are blind to cloud apps and the majority of data movement, a new protection approach is needed to extend beyond the traditional corporate perimeter.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data protection is a core principle of any security strategy and requires visibility into data-at-rest and data-in-motion for effective data loss protection (DLP) policies and rules. Combine this objective with [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[],"class_list":["post-9588","tribe_events","type-tribe_events","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Protection in the Cloud - DIB SCC CyberAssist<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Protection in the Cloud - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"Data protection is a core principle of any security strategy and requires visibility into data-at-rest and data-in-motion for effective data loss protection (DLP) policies and rules. Combine this objective with [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/events\/data-protection-in-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-15T16:15:41+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/events\/data-protection-in-the-cloud\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/events\/data-protection-in-the-cloud\/\",\"name\":\"Data Protection in the Cloud - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"datePublished\":\"2020-09-15T15:54:07+00:00\",\"dateModified\":\"2020-09-15T16:15:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/events\/data-protection-in-the-cloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/events\/data-protection-in-the-cloud\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/events\/data-protection-in-the-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\/\/ndisac.org\/dibscc\/events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Data Protection in the Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Protection in the Cloud - DIB SCC CyberAssist","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Data Protection in the Cloud - DIB SCC CyberAssist","og_description":"Data protection is a core principle of any security strategy and requires visibility into data-at-rest and data-in-motion for effective data loss protection (DLP) policies and rules. Combine this objective with [&hellip;]","og_url":"https:\/\/ndisac.org\/dibscc\/events\/data-protection-in-the-cloud\/","og_site_name":"DIB SCC CyberAssist","article_modified_time":"2020-09-15T16:15:41+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/events\/data-protection-in-the-cloud\/","url":"https:\/\/ndisac.org\/dibscc\/events\/data-protection-in-the-cloud\/","name":"Data Protection in the Cloud - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"datePublished":"2020-09-15T15:54:07+00:00","dateModified":"2020-09-15T16:15:41+00:00","breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/events\/data-protection-in-the-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/events\/data-protection-in-the-cloud\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/events\/data-protection-in-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/ndisac.org\/dibscc\/events\/"},{"@type":"ListItem","position":3,"name":"Data Protection in the Cloud"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events\/9588"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=9588"}],"version-history":[{"count":2,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events\/9588\/revisions"}],"predecessor-version":[{"id":9590,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events\/9588\/revisions\/9590"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=9588"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tags?post=9588"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events_cat?post=9588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}