Episode 39 — Govern information across its lifecycle from creation through secure disposal (1C2)

This episode focuses on governing information across its lifecycle so value is captured while risk is controlled from the moment data is created until it is securely disposed of. You’ll define lifecycle governance stages such as creation or collection, classification, storage, access and sharing, processing, archival, retention, and disposal, and you’ll learn how each stage creates specific control and accountability needs. We’ll cover practical examples like ensuring retention aligns with legal requirements, preventing sensitive data from lingering in backups, controlling secondary use that violates purpose limits, and disposing of data in a way that is verifiable and consistent with contracts. Real-world troubleshooting includes “data hoarding” because no one owns deletion decisions, uncontrolled copies created for analytics, and inconsistent handling rules across departments that make compliance impossible to prove. For CGEIT scenarios, strong answers usually emphasize lifecycle clarity, measurable controls, and assigned ownership so governance is repeatable and auditable rather than relying on best intentions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 39 — Govern information across its lifecycle from creation through secure disposal (1C2)
Broadcast by