Training Flashcards

1
Q

Two Big O’s Data Brings

A
  1. Opportunities, 2. Obilgations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Obligations that come…

A
  1. Keep data SECURE from external threats
  2. Use Data respecting global PRIVACY regulations
  3. GOVERN Data against internal misuse
  4. Continuously COMPLY with 100s of regulations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Keep Data ____ from external threats
A

SECURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Use Data respecting global ____ regulations
A

PRIVACY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. _______ Data against internal misuse
A

GOVERN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4.Continuously _____ with 100s of regulations

A

COMPLY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is a big challenge for SECURITY, PRIVACY and COMPLIANCE

A

Data Sprawl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

On average, an enterprise has ____ data asset type

A

400+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Security, Privacy, and Compliance needs a ______________

A

UNIFIED FRAMEWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Securiti?

A

AI Powered Data Security, Privacy and Compliance across Multi-Cloud, SaaS and On-Premise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 areas Securiti can address

A
  1. Data Security
  2. PrivacyOps
  3. Data Compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Globally ____, ____-______ Data Analysis Pods

A

Distributed, Hyper-Scaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Common _____, Detection ____, Labeling and _____

A

Common Grammar, Detection Policies, Labeling, Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Securiti Sensitive Data Intelligence

A
  1. Shadow Data Asset Discovery
  2. Data Discovery Classification and Labeling
  3. Sensitive Data Catalog
  4. People Data Graph
  5. Sensitive Asset + Data Posture
  6. Data Risk Graph
  7. Security & Privacy Metadata
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Shadow Data Asset Discovery
A

Automatically discover Data Assets, managed and unmanaged across your entire multi-cloud footprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Data Discovery
A

Automatically Discover and Classify Sensitive Data across multi-cloud, at petabyte scale. Apply policy based labels and tags for unstructured and structured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Sensitive Data Catalog
A

Discover sensitive and personal data across any structured and unstructured assets. Automatically Classify and Label sensitive files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. People Data Graph
A

A Graph between an individual and her personal data. It’s the foundation for automatically fulfilling the personal data requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Sensitive Asset and Data Posture
A

Protect data stores and sensitive data to prevent internal and external exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Data Risk Graph
A

Monitor data stores and sensitive data for external and internal exposures and risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Security and Privacy Metadata
A

Enrich sensitive data catalogs with privacy, security, and governance metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data Security

A

Identify data risks and enable protections and controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data Security: Discover _____ data assets

A

Shadow

24
Q

Data Security: Monitor___ ____ security ______

A

data, asset, posture

25
Q

Data Security: Discover,____, and ___ data to ensure controls are enabled

A

Classify and Label

26
Q

Data Security: Data Risk Graph- Risk ____ for Risk ____ and Risk _____.

A

Engine, Scoring, Attribution

27
Q

Data Security: Enforce data ____. Policy based _____ and ____ to protect data from external and internal threats

A

Protection, alerts, remediations

28
Q

Data Security: ____ sensitive data access. _____-____ access governance for data systems

A

Govern, policy-based

29
Q

Data Security: ___ security issues and take ______ actions

A

investigate, remediation

30
Q

Data Security: continuous _____

A

compliance

31
Q

PrivacyOps Platform

A

Robotic Automation Makes Privacy Simple

32
Q

Privacy: data ______ automation. Up to date records of _____. Enable ______ by design, _____s, _____ report based on real data

A

mapping, processing, DPIAs, Article 30

33
Q

Privacy: ____ Robotic Automation. Automatic fulfillment of ________ Rights. Automate data ____ _____ request fulfillment and maintain ______ of _______

A

DSR, Individual, subject rights, proof, compliance

34
Q

Privacy: Data Incident ______.

A

Management

35
Q

Privacy: _________ Automation. ___ once and comply with many _______

A

Assessment, Audit, regulations

36
Q

Privacy: _______ management. _____ and ____ user consent

A

Consent. Capture. Honor.

37
Q

Privacy: ______ Privacy Assessment. System of _____, _______, _______, and _____ for 3rd party privacy risks

A

Vendor, record, engagement, automation, insights

38
Q

Privacy: Privacy ______ Automation. Automatically _____ and ____ your policies and notices

A

Notice, update, refresh

39
Q

Workflow Orchestrator

A

Automate and orchestrate workflows

40
Q

Multiple deployment models

A
  1. SaaS, 2. Hybrid 3. Sovereign
41
Q

CMDB

A

A configuration management database is an ITIL term for a database used by an organization to store information about hardware and software assets

42
Q

Data asset discovery: CMDB Integration

A

Get real time visibility into data assets with native integration into existing CMDPs such as Service now

43
Q

Data Discovery: Rich classifiers

A

Detect hundreds of sensitive data elements specific to security compliance and global privacy laws such as GDPR, LGPD, and more

44
Q

GDPR

A

The General Data Protection Regulation (GDPR) is a legal framework that sets guidelines for the collection and processing of personal information from individuals who live in the European Union (EU)

45
Q

Article 30

A

requires companies to produce “records of processing activities”, which will allow regulators to see that companies are adhering to GDPR.

46
Q

Data Mapping Automation

A

Always up to date Data Maps and “records of processing”

47
Q

Data Mapping Automation enables..

A

Continuous privacy by design, DPIAs, Article 30 report based on real data ~Clear Understanding of Risk~

48
Q

DPIA

A

A Data Protection Impact Assessment (DPIA) is a process to help you identify and minimize the data protection risks of a project.

49
Q

Record of processing

A

Record of processing activities is a written description of organizations personal data processing

50
Q

DSR Robotic Automation

A

Automatic fulfillment of Individual Rights - Automate data subject rights request fulfillment and maintain proof of compliance

51
Q

Data Incident Management Workflows

A

Automate the incident response process by gathering incident details, identifying the scope and optimizing notifications to comply with global privacy regulations

52
Q

Assessment Automation

A

Automate PIAs & Privacy by Design triggers with Aoftware Development Lifecycle and Data Mapping

53
Q

PIAs

A

Privacy Impact Statement - A Privacy Impact Assessment is a process which assists organizations in identifying and managing the privacy risks arising from new projects, initiatives, systems, processes, strategies, policies, business relationships etc.

54
Q

Consent Management

A

Capture and honor user consent - use data aligned with consent of the user

55
Q

Vendor Privacy Assessments

A

Continuously assess third party privacy risks - supply chain risk controls

56
Q

Privacy Notice Automation

A

Dynamic Privacy Policies and notices. Build Brand