Data Protection 2.0 in a Web 2.0 World

Learn why system configurations and log files should be added to the sensitive data family. Take a sneak peek at the theories Jim covered in the whitepaper "Data Protection 2.0: It’s Not Just Names and Numbers Anymore," and discover why data protection must take a behavior modeling approach.