Sensitive Data Protection Strategies: Transforming from Legacy to a Cyber Frontier
8:30am - 9:15am
Description: With the rise of hacktivism (the fusion of hacking and activism) along with the increased number of “reported” breaches, organizations must deploy a complete sensitive data protection strategy. This session will provide an overview and outline for developing a holistic approach to protecting sensitive data, which includes personally identifiable information (PII), protected health information (PHI), payment card information (PCI) as well as intellectual property in both structured and unstructured formats.
John B. Sapp Jr.
A visionary, strategic and certified Information Technology professional with more than 25 years of in-depth and cross-industry experience that includes healthcare, telecommunications, financial services, retail and manufacturing. His career spans a progression of roles from Systems Operations and Network Administration, Software Engineering, Business Analysis, IT Project Management, Information Security, IT Risk Management, Disaster Recovery and Business Continuity Planning.