When you ask individuals what they think a defensible security architecture includes, most will say things such as antivirus, firewalls, intrusion prevention, SIEM, whitelisting, etc. And yet, these technologies mean absolutely nothing if you do not know where your data is or how sensitive it is. Do not waste your best defenses by not applying them correctly. Put another way, how can you secure your environment if you run around blind.
This webcast focuses in on the data-centric security model. Know thy data and its importance so that you may effectively make decisions to secure it. If you have a critical web-server you probably also have a vital database. Of course, this discussion would not be complete without talking about finding data in places it should not be. Because if you are not checking for data in unauthorized locations, you likely have data in unauthorized locations.