Data Privacy & Protection
Community Posts
How is your organization mitigating risks from smart wearables or covert recording devices during sensitive conversations? Please share any relevant policies, technical solutions, or experiences managing this challenge.
Any tips or best practices you can share for developing a cryptographic bill of materials (CBOM)? What’s the best way to get started?
Cloud Security33%
Cloud Data Analytics (Streaming, Big Data, AI, Data Lake, Data Warehouse etc.)51%
Cloud Migration / Modernization43%
Cloud Native Development (DevOps, Micro Services, Containers, Kubernetes, etc.)31%
Cloud Data (Databases, Data Management, Governance, etc.)14%
We're facing a challenge in R&D: our current DRM solution effectively protects sensitive TSIP (Trade Secret and Intellectual Property) data, but it prevents researchers from searching across encrypted files—hindering their work.
While we’ve considered relying solely on SharePoint permissions and Entra capabilities, the growing risk of insider threats makes this a last resort.
Has anyone solved a similar issue? Are there DRM or encryption solutions that allow secure, searchable access to protected content?
If anyone has successfully used Bring Your Own Key (BYOK) in the cloud: Which Hardware Security Module (HSM) or key management method did you use, and with which cloud service provider(s) (CSP)? Any advice to an organization considering this option?
Encrypting data so if we are hacked, the data can't be read or exploited39%
Multi-factor authentication and phishing awareness training is enough to stop attacks before they get in59%
Something else (comment below)1%
Excellent (more than enough)10%
Good (we have enough to reach our goals)55%
Acceptable (could be better but we make do)31%
Poor/unacceptable (more funding needed ASAP)3%
Unsure / other