In today\u2019s world, conventional cyber thinking remains largely focused on perimeter-centric security controls designed to govern how identities and endpoints utilize networks to access applications and data that organizations possess internally. Against this backdrop, a group of innovators and security thought leaders are exploring a new frontier and asking the question: shouldn\u2019t there be a standard way to protect sensitive data regardless of where it resides or who it\u2019s been shared with? It\u2019s called \u201cdata-centric\u201d security and it\u2019s fundamentally different from \u201cperimeter-centric\u201d security models.\xa0Practicing it at scale requires a standard way to extend the value of \u201cupstream\u201d data governance (discovery, classification, tagging) into \u201cdownstream\u201d collaborative workflows like email, file sharing, and SaaS apps.\nIn this episode of CyberWire-X, the CyberWire\u2019s Rick Howard and Dave Bittner explore modern approaches for applying and enforcing policy and access controls to sensitive data which inevitably leaves your possession but still deserves just as much security as the data that you possess internally.\xa0Rick and Dave are joined by guests Bill Newhouse, Cybersecurity Engineer at National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE), and Dana Morris, Senior Vice President for Product and Engineering of our episode sponsor Virtru.\xa0\nLearn more about your ad choices. Visit megaphone.fm/adchoices