Once you have discovered where all your data resides, the next step is defining its sensitivity so you can handle it securely across the data lifecycle.