IBMs Critical Data Protection Program follows the recommended five-step approach to protect sensitive data. IBM: With 44.5 percent of attacks perpetrated by malicious insiders, guarding against insider threats is becoming a pressing concern. IBM has developed a program to protect the most sensitive data with the highest business value, commonly known as crown jewel data, as depicted below. The five steps: Define, discover, identify and classify critical data stored in structured and unstructured repositories. Identify the critical data, how it originated, how sensitive is it, what it can be used for and so on.”]
Source: https://securityintelligence.com/five-steps-to-protect-your-critical-data-from-insider-threats/

