Securing Schrodinger's Spreadsheets: Next-Generation Protection

Logo
Presented by

Jennifer Stirrup, Thought Leader - BI and AI | Data Relish

About this talk

Hidden in plain sight, thousands of spreadsheets containing your organization's most sensitive data exist in a precarious state of quantum uncertainty, simultaneously secure and compromised until someone actually checks. Scattered across email inboxes, personal laptops, shared drives, and cloud storage — these files represent significant yet often overlooked security vulnerabilities. Like Schrödinger's famous cat paradox, organizations operate under the assumption that their spreadsheet data remains secure until someone actually examines their protection measures. This is a gamble that increasingly leads to costly data breaches and compliance violations. The challenge lies not just in identifying these dispersed assets but implementing effective protection without disrupting productivity. As regulatory requirements tighten and cyber threats evolve, traditional approaches to spreadsheet security fall dangerously short. Organizations dependent on Excel and similar platforms require specialized strategies that balance robust protection with practical usability, addressing weak access controls, unregulated sharing practices and inadequate encryption that leave sensitive financial, customer and operational data exposed to both internal and external threats. This presentation delivers actionable, next-generation strategies to transform spreadsheet chaos into a secure, compliant data ecosystem. Key Takeaways: - Practical techniques to identify and classify at-risk spreadsheets across your organization's digital landscape - Implementation strategies for access controls and encryption specifically designed for Excel and similar platforms - Methods to integrate spreadsheet security into your broader data protection framework without disrupting workflow - Policy development guidelines that address both compliance requirements and operational needs - Real-world examples of how leading organizations have successfully secured their spreadsheet environments
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (678)
Subscribers (222539)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.