Data sprawl is an issue facing organizations of all types and sizes. Information of all kinds is being stored in a wide variety of places within organizations. Identifying the "crown jewels" that are of the utmost importance to protect is not an easy process. It is one that will take considerable time, energy and coordination across the business. It requires knowledge and a good understanding of data locations, data ownership and data flows both inside and outside of the company, regardless of whether it involves regulated or compliance-related information. If these pieces of data end up in the wrong hands because of poor security, they can have considerable negative consequences for the company. There are several steps for creating a process to identify the cyber assets that are critical to meeting an organization’s mission: http://bit.ly/2MhLy7G http://bit.ly/2MhLy7G+ -- Peterk Dallas, Tx [log in to unmask] Save our in-boxes! http://emailcharter.org “If only there were a massive entity that I were forced to fund to tell me how I should live my life, since I’m so obviously incapable of deciding for myself.” M. Hashimoto To view the list archives go to: https://www.jiscmail.ac.uk/cgi-bin/webadmin?A0=RECORDS-MANAGEMENT-UK To unsubscribe from this list, send an email to [log in to unmask] with the words UNSUBSCRIBE RECORDS-MANAGEMENT-UK For any technical queries re JISC please email [log in to unmask] For any content based queries, please email [log in to unmask]