Forward-thinking leaders are taking steps to understand where long-lived sensitive data resides and how it’s protected, as well as to modernize cryptographic strategies.