Training Flashcards

1
Q

Two Big O’s Data Brings

A
  1. Opportunities, 2. Obilgations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Obligations that come…

A
  1. Keep data SECURE from external threats
  2. Use Data respecting global PRIVACY regulations
  3. GOVERN Data against internal misuse
  4. Continuously COMPLY with 100s of regulations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Keep Data ____ from external threats
A

SECURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Use Data respecting global ____ regulations
A

PRIVACY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. _______ Data against internal misuse
A

GOVERN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4.Continuously _____ with 100s of regulations

A

COMPLY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is a big challenge for SECURITY, PRIVACY and COMPLIANCE

A

Data Sprawl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

On average, an enterprise has ____ data asset type

A

400+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Security, Privacy, and Compliance needs a ______________

A

UNIFIED FRAMEWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Securiti?

A

AI Powered Data Security, Privacy and Compliance across Multi-Cloud, SaaS and On-Premise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 areas Securiti can address

A
  1. Data Security
  2. PrivacyOps
  3. Data Compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Globally ____, ____-______ Data Analysis Pods

A

Distributed, Hyper-Scaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Common _____, Detection ____, Labeling and _____

A

Common Grammar, Detection Policies, Labeling, Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Securiti Sensitive Data Intelligence

A
  1. Shadow Data Asset Discovery
  2. Data Discovery Classification and Labeling
  3. Sensitive Data Catalog
  4. People Data Graph
  5. Sensitive Asset + Data Posture
  6. Data Risk Graph
  7. Security & Privacy Metadata
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Shadow Data Asset Discovery
A

Automatically discover Data Assets, managed and unmanaged across your entire multi-cloud footprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Data Discovery
A

Automatically Discover and Classify Sensitive Data across multi-cloud, at petabyte scale. Apply policy based labels and tags for unstructured and structured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Sensitive Data Catalog
A

Discover sensitive and personal data across any structured and unstructured assets. Automatically Classify and Label sensitive files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. People Data Graph
A

A Graph between an individual and her personal data. It’s the foundation for automatically fulfilling the personal data requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Sensitive Asset and Data Posture
A

Protect data stores and sensitive data to prevent internal and external exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Data Risk Graph
A

Monitor data stores and sensitive data for external and internal exposures and risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Security and Privacy Metadata
A

Enrich sensitive data catalogs with privacy, security, and governance metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data Security

A

Identify data risks and enable protections and controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data Security: Discover _____ data assets

24
Q

Data Security: Monitor___ ____ security ______

A

data, asset, posture

25
Data Security: Discover,____, and ___ data to ensure controls are enabled
Classify and Label
26
Data Security: Data Risk Graph- Risk ____ for Risk ____ and Risk _____.
Engine, Scoring, Attribution
27
Data Security: Enforce data ____. Policy based _____ and ____ to protect data from external and internal threats
Protection, alerts, remediations
28
Data Security: ____ sensitive data access. _____-____ access governance for data systems
Govern, policy-based
29
Data Security: ___ security issues and take ______ actions
investigate, remediation
30
Data Security: continuous _____
compliance
31
PrivacyOps Platform
Robotic Automation Makes Privacy Simple
32
Privacy: data ______ automation. Up to date records of _____. Enable ______ by design, _____s, _____ report based on real data
mapping, processing, DPIAs, Article 30
33
Privacy: ____ Robotic Automation. Automatic fulfillment of ________ Rights. Automate data ____ _____ request fulfillment and maintain ______ of _______
DSR, Individual, subject rights, proof, compliance
34
Privacy: Data Incident ______.
Management
35
Privacy: _________ Automation. ___ once and comply with many _______
Assessment, Audit, regulations
36
Privacy: _______ management. _____ and ____ user consent
Consent. Capture. Honor.
37
Privacy: ______ Privacy Assessment. System of _____, _______, _______, and _____ for 3rd party privacy risks
Vendor, record, engagement, automation, insights
38
Privacy: Privacy ______ Automation. Automatically _____ and ____ your policies and notices
Notice, update, refresh
39
Workflow Orchestrator
Automate and orchestrate workflows
40
Multiple deployment models
1. SaaS, 2. Hybrid 3. Sovereign
41
CMDB
A configuration management database is an ITIL term for a database used by an organization to store information about hardware and software assets
42
Data asset discovery: CMDB Integration
Get real time visibility into data assets with native integration into existing CMDPs such as Service now
43
Data Discovery: Rich classifiers
Detect hundreds of sensitive data elements specific to security compliance and global privacy laws such as GDPR, LGPD, and more
44
GDPR
The General Data Protection Regulation (GDPR) is a legal framework that sets guidelines for the collection and processing of personal information from individuals who live in the European Union (EU)
45
Article 30
requires companies to produce “records of processing activities”, which will allow regulators to see that companies are adhering to GDPR.
46
Data Mapping Automation
Always up to date Data Maps and "records of processing"
47
Data Mapping Automation enables..
Continuous privacy by design, DPIAs, Article 30 report based on real data ~Clear Understanding of Risk~
48
DPIA
A Data Protection Impact Assessment (DPIA) is a process to help you identify and minimize the data protection risks of a project.
49
Record of processing
Record of processing activities is a written description of organizations personal data processing
50
DSR Robotic Automation
Automatic fulfillment of Individual Rights - Automate data subject rights request fulfillment and maintain proof of compliance
51
Data Incident Management Workflows
Automate the incident response process by gathering incident details, identifying the scope and optimizing notifications to comply with global privacy regulations
52
Assessment Automation
Automate PIAs & Privacy by Design triggers with Aoftware Development Lifecycle and Data Mapping
53
PIAs
Privacy Impact Statement - A Privacy Impact Assessment is a process which assists organizations in identifying and managing the privacy risks arising from new projects, initiatives, systems, processes, strategies, policies, business relationships etc.
54
Consent Management
Capture and honor user consent - use data aligned with consent of the user
55
Vendor Privacy Assessments
Continuously assess third party privacy risks - supply chain risk controls
56
Privacy Notice Automation
Dynamic Privacy Policies and notices. Build Brand