Data Security: Protect your critical data (or else)

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 ส.ค. 2024
  • Learn about current threats: ibm.biz/BdP3C9
    IBM Security Guardium: ibm.biz/BdP3CT
    Data is the lifeblood of a modern IT system. It's intellectual property, sensitive customer information -- even money itself. The "bad guys" want it, so how do the "good guys" protect their data? In this video, Jeff "the security guy" explains a six-step process for creating a data security strategy. With this holistic view, you'll understand what's needed and where to start.
    #AI #Software #Dev #lightboard #IBM #Jeffcrume #Datasecurity
    Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
    Subscribe to see more videos like this in the future → ibm.biz/subscribe-now

ความคิดเห็น • 23

  • @NK-iw6rq
    @NK-iw6rq ปีที่แล้ว +7

    Another great video by Jeff and the IBM team !

  • @RafaelGonzalez-wn3jo
    @RafaelGonzalez-wn3jo ปีที่แล้ว +3

    Excellent as usual!!!!!!

  • @belsocial
    @belsocial ปีที่แล้ว +6

    An excellent high-level understanding of data security. You'll simply know where to go and in what order to dig deeper. Thanks!

    • @jeffcrume
      @jeffcrume ปีที่แล้ว

      Thanks so much for all the encouraging words, Elias!

    • @andalonds
      @andalonds 8 วันที่ผ่านมา

      @@jeffcrumeHi I am recent graduate of the University of the West Indies. I am building a website to teach small and medium business all of these things as well as provide services. Can I please use this video for my home page. Thank you kindly. My Name is Odessa Singh.

  • @mmava279
    @mmava279 ปีที่แล้ว +2

    amazing video!

  • @securetechtalk
    @securetechtalk ปีที่แล้ว +2

    Quality content.👏

  • @veemtg
    @veemtg 10 วันที่ผ่านมา

    well explained there!!!

  • @Moviebear-yh1tm
    @Moviebear-yh1tm หลายเดือนก่อน

    It's very interesting 🤔❤️

  • @blogcorpo
    @blogcorpo 8 หลายเดือนก่อน

    Wonderful content! ♥♥

    • @jeffcrume
      @jeffcrume 6 หลายเดือนก่อน

      Thanks!

  • @LutherDrucker
    @LutherDrucker 2 หลายเดือนก่อน

    Data security is very crucial in important point to ponder. And I found this gem Irys which is providing strong data provenance and traceability to origin of data. What are your views on this?

  • @brickforcezocker01
    @brickforcezocker01 ปีที่แล้ว +1

    Does anybody know how you make a Video like this, where is seems like one is writing on an invisible screen ? :)

    • @jeffcrume
      @jeffcrume ปีที่แล้ว +1

      I’m working on a behind the scenes video that explains the process so stay tuned …

  • @andalonds
    @andalonds 8 วันที่ผ่านมา

    hI i WOULD LIKE TO GET PERMISSION TO USE THIS VIDEO ON A WEBSITE PLEASE

  • @abdalladalle4064
    @abdalladalle4064 ปีที่แล้ว +2

    Where Does DLP fall in here ?

    • @jeffcrume
      @jeffcrume ปีที่แล้ว +3

      Good question. That was an error on my part to leave it out. You could put it either under Detect or Protect since it has aspects of both

    • @abdalladalle4064
      @abdalladalle4064 ปีที่แล้ว

      @@jeffcrume thanks for your reply.

  • @abdullahimaalim-yi5tl
    @abdullahimaalim-yi5tl 2 หลายเดือนก่อน

    wyhat.

  • @beng9145
    @beng9145 ปีที่แล้ว

    audio bad on this one too

  • @joescoggins5937
    @joescoggins5937 ปีที่แล้ว +1

    I have a box with some wires, a monitor and a router. I don't speak IT. Not a word of it. This video made absolutely no sense to me. I don't know what "Govern" means in terms of my computer, nor "discover." I have a vague idea of what "protect" means, but not what "encript," "key mgmt," "comply," "detect," or "respond" mean in terms of "critical data," whatever than means. Speaking above the heds of the average viewer is not likley to garner you many viewers.

    • @alexbardelli1
      @alexbardelli1 ปีที่แล้ว +9

      Then you’re in the wrong channel my friend

    • @philipehusani
      @philipehusani 8 หลายเดือนก่อน +5

      LoL... They're not talking to you!