So we do not give you a textbook answer that may or may not apply.
Can you help us answer your question by providing a bit of details about the organization? To help guide any customer, understanding their current environment is imperative. For example: how big is the IT…
There are easily a dozen low hanging fruit and I would start with the none tech vector: data owners and stewards. Then comes the education and policy dissemination of the company’s stand on data loss. After a move to the tech implementation to detect common signs such as DLP…
With experience in both IT and Audit, I can say the answer most often leads to a tried and true combination of preventative and detective mechanisms/controls. These two methods though very different help with achieving the goal of minimizing breaches and detecting them so…