Mayurakshi leads Solution Engineering for Aujas, a global Information Risk Management firm. Mayurakshi has a professional career of over 15 years in leadership roles in client management, strategic solutioning and delivery around information security, risks, process improvement and controls. Her core strength is to bring solutions to achieve business objectives and manage stakeholder expectations. Mayurakshi has the unique career map of working with consulting in Big4s, having employed with PwC for 13.5 years, as well as in the industry, having worked as a CISO & Chief Risk & Compliance Officer with large, global service provider organizations. Her core specialization is with risk management, governance and security.
MayurakshiRComments Off on Data Protection begins with Data Lifecycle Management
The key to cyber security management is to protect your data. The first step to protect your data is to ‘know’ your data – where, rather where all, is the data, where is it originating, flowing, residing, getting touched, tampered, deleted and such.
Shadow IT, or the event where technology related activities or developments are conducted outside of and without the knowledge of the enterprise IT team, is one of the phenomenon that has gained prominence in recent years.