Hi [[ session.user.profile.firstName ]]

Get Rid of the Fear: A Practical Approach for Using DLP to Manage Risk

CIOs don’t need to be convinced about data loss protection. Compliance, financial implications, brand reputation are all factors that drive this need. The real problem is that people are afraid of failure and wasting time, money, resources. They've heard about the operational nightmares, the
CIOs don’t need to be convinced about data loss protection. Compliance, financial implications, brand reputation are all factors that drive this need. The real problem is that people are afraid of failure and wasting time, money, resources. They've heard about the operational nightmares, the complexity and failed deployments over the last several years. In addition, RSA and Symantec both had data stolen publically, implying the integrity of the solutions’ value is uncertain.

During this interactive session attendees will receive valuable insight on how security works and learn the secret of understanding and communicating risk. Equipped with this knowledge, Andrew will provide a practical and measurable framework for managing risk to information assets using Data Loss Prevention.

What attendees will learn:
Guiding Principles of Security and Risk Management
Data Breach Trends from the Last 6 Years
DLP Methodology and Execution Strategy
Success Factors in Addressing the Web DLP Challenge
Recorded Apr 5 2012 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Andrew Forgie, CISSP Websense Director of Product Marketing – Data Security
Presentation preview: Get Rid of the Fear: A Practical Approach for Using DLP to Manage Risk
Recommended for you:
  • Date
  • Rating
  • Views
  • The Dangerous Misperception of Ransomware The Dangerous Misperception of Ransomware Harlan Carvey, Security Analysis Senior Consultant, SecureWorks Counter Threat Unit Research Team Recorded: May 5 2016 61 mins
    The proliferation of Ransomware has ushered in a new wave of extortionware and a new generation of malware attacks. While these types of attacks are not new, they have become more insidious and sophisticated, growing in popularity in concert with the expansion of electronic payment systems such as bitcoin. In April, the US and Canada both issued formal warnings and suggestions, but how much that is reported about this new malware is true? Are we being naïve in our efforts to block these Ransomware attacks?

    Attend this webcast to learn not only the truth behind Ransomware attacks, but also how to protect your organization utilizing a holistic and unifying visibility into your network and endpoints. Secureworks Security Analysis Senior Consultant, Harlan Carvey will answer vital questions about the nature of Ransomware and provide more insight into the actors, their methods, and their motivations:

    - What is Ransomware?
    - How does it proliferate?
    - How do I detect and block it?
    - How do I know what systems are compromised or how the attacker got in?
    - Do I pay the ransom if I am attacked?
    - How do I ensure that I don’t become a victim (again)?
  • The Keys to a Secure Hybrid Cloud Environment The Keys to a Secure Hybrid Cloud Environment Paul Fletcher, Cyber Security Evangelist, Alert Logic Recorded: May 5 2016 59 mins
    Despite increasing cloud adoption in IT departments, many organizations are still concerned with data security. Those concerns are amplified by the loss of physical control over data and the potential for mismanagement of those assets when migrating to the cloud. As a result, this is often the top barrier to cloud deployment. However, with cloud innovations growing exponentially, the new wave of security solutions is breaking down those barriers.

    In this webinar, Alert Logic cyber security evangelist, Paul Fletcher, will provide you with insight on how to get over hybrid cloud security hurdles and discuss:

    • Common misconceptions surrounding hybrid cloud security
    • Key strategies to secure a hybrid cloud environment
    • Solutions to security threats within multiple hybrid cloud environments
  • Rock the CASB Part 3: Enabling Secure BYOD w/Cloud Access Security Brokers Rock the CASB Part 3: Enabling Secure BYOD w/Cloud Access Security Brokers Rich Campagna, VP, Products Salim Hafid, Product Marketing Manager Recorded: May 5 2016 61 mins
    As organizations migrate to services like Google Apps and Office 365, there is a growing need to secure data both in the cloud and across mobile devices. With CASB, IT administrators can distinguish between managed and unmanaged mobile devices without invasive agents, yet are able to limit access to sensitive data using granular policy controls. CASBs even enable control over data once downloaded to an end-user's device. Join Bitglass and (ISC)2 on May 5, 2016 at 1:00PM Eastern for the final part of our three-part webinar series, where we discuss the drawbacks of existing mobile security solutions and the ease of deploying a CASB to secure BYOD without hassles.
  • Cloud data warehouses: Why simple is better Cloud data warehouses: Why simple is better Evan Schuman, VentureBeat Recorded: May 5 2016 61 mins
    The first rule of data analytics for fast-growing companies? Measure all things. When putting in place a robust data analytics strategy to go from measurement to insight, you’ve got lots of options for tools -- from databases and data warehouse options to new “big data” tools such as Hadoop, Spark, and their related components. But tools are nothing if you don’t know how to put them to use.

    We’re going to get some real talk from practitioners in the trenches and learn how people are bringing together new big data technologies in the cloud to deliver a truly world class data analytics solution. One such practitioner is Celtra, a fast-growing provider of creative technology for data-driven digital display advertising. We’re going to sit down with the Director of Engineering, Analytics at Celtra to learn how they built a high-performance data processing pipeline using Spark + a cloud data warehouse, enabling them to process over 2 billion analytics events per day in support of dashboards, applications, and ad hoc analytics.

    In this webinar you’ll:

    * Build a simpler, faster solution to support your data analytics
    * Support diverse reporting and ad hoc analytics in one system
    * Take advantage of the cloud for flexibility, scaling, and simplicity

    Speakers:

    * Evan Schuman, Moderator, VentureBeat
    * Grega Kešpret, Director of Engineering, Analytics, Celtra
    * Jon Bock, VP of Marketing and Products, Snowflake

    Register today and learn how the top SaaS strategies can streamline your business.

    Sponsored by Snowflake
  • Improve CX, Productivity, Revenues and Security with Identity Coherence Improve CX, Productivity, Revenues and Security with Identity Coherence Steve Tout of Forte Advisory Recorded: May 5 2016 56 mins
    Customers expect a seamless experience across services and devices, critical to ensure successful conversions and renewals in e-commerce. At the same time, the impact of disconnected user experience on employee productivity can have significant financial implications. Big egos, politics, a shortage of skilled talent, legacy systems and complexity can also conspire to undermine the success of your IAM program unless you plan for and take massive action today. Join Steve Tout as he presents Identity Coherence, a blueprint for creating massive value and success with IAM in a multi-vendor, multi-cloud environment.
  • Scary Facts About Online Security Scary Facts About Online Security Tricia Pattee, HOSTING Director of Managed Services Recorded: May 5 2016 29 mins
    As the Internet of Things encourages businesses to embrace big data, IT professionals turn to online resources to house and manage applications. However, cyber attacks are increasingly becoming a matter of “when,” not “if,” leading IT professionals to seek robust security solutions. Still on the fence about whether your small to medium sized enterprise really needs that much protection? Join Tricia Pattee, Product Manager at HOSTING, for a 30 minute webinar about scary facts about online security you need to know. Bring your questions – we’ll host a Q&A at the end of the presentation.
  • Securing the Foundation to Secure the Cloud Securing the Foundation to Secure the Cloud J. Trent Adams, Director of Ecosystem Security, PayPal Recorded: May 5 2016 42 mins
    Secure clouds don't exist in a vacuum. The very nature of a secure cloud relies on effective standardized, interoperable, and scalable Internet security. As the cloud metaphor displaces the concept of proprietary point-to-point networked servers, the key to its value can be found in the interoperability of service protocols. Securing these connections requires understanding and deploying standards such as TLS HSTS, CT, CSP, DMARC, and FIDO. Each protocol addresses specific security concerns encountered when you extend your security perimeter to include external cloud services. Developing and deploying technologies like these requires a holistic view of the security landscape, and working within a robust Internet security ecosystem.

    Key Talking Points:

    - Cloud security relies on standardized Internet security protocols.

    - Developing Internet security protocols requires multistakeholder involvement.

    - Key areas of focus include securing: transport, content, communication, and authentication.

    - Case studies presented in developing CT, CSP, DMARC, FIDO, and TLS 1.3

    - Internet security is constantly evolving; adapt or perish.
  • Securing the Foundation to Secure the Cloud Securing the Foundation to Secure the Cloud J. Trent Adams, Director of Ecosystem Security, PayPal Recorded: May 5 2016 42 mins
    Secure clouds don't exist in a vacuum. The very nature of a secure cloud relies on effective standardized, interoperable, and scalable Internet security. As the cloud metaphor displaces the concept of proprietary point-to-point networked servers, the key to its value can be found in the interoperability of service protocols. Securing these connections requires understanding and deploying standards such as TLS HSTS, CT, CSP, DMARC, and FIDO. Each protocol addresses specific security concerns encountered when you extend your security perimeter to include external cloud services. Developing and deploying technologies like these requires a holistic view of the security landscape, and working within a robust Internet security ecosystem.

    Key Talking Points:

    - Cloud security relies on standardized Internet security protocols.

    - Developing Internet security protocols requires multistakeholder involvement.

    - Key areas of focus include securing: transport, content, communication, and authentication.

    - Case studies presented in developing CT, CSP, DMARC, FIDO, and TLS 1.3

    - Internet security is constantly evolving; adapt or perish.
  • Securing the Foundation to Secure the Cloud Securing the Foundation to Secure the Cloud J. Trent Adams, Director of Ecosystem Security, PayPal Recorded: May 5 2016 42 mins
    Secure clouds don't exist in a vacuum. The very nature of a secure cloud relies on effective standardized, interoperable, and scalable Internet security. As the cloud metaphor displaces the concept of proprietary point-to-point networked servers, the key to its value can be found in the interoperability of service protocols. Securing these connections requires understanding and deploying standards such as TLS HSTS, CT, CSP, DMARC, and FIDO. Each protocol addresses specific security concerns encountered when you extend your security perimeter to include external cloud services. Developing and deploying technologies like these requires a holistic view of the security landscape, and working within a robust Internet security ecosystem.

    Key Talking Points:

    - Cloud security relies on standardized Internet security protocols.

    - Developing Internet security protocols requires multistakeholder involvement.

    - Key areas of focus include securing: transport, content, communication, and authentication.

    - Case studies presented in developing CT, CSP, DMARC, FIDO, and TLS 1.3

    - Internet security is constantly evolving; adapt or perish.
  • Securing the Foundation to Secure the Cloud Securing the Foundation to Secure the Cloud J. Trent Adams, Director of Ecosystem Security, PayPal Recorded: May 5 2016 42 mins
    Secure clouds don't exist in a vacuum. The very nature of a secure cloud relies on effective standardized, interoperable, and scalable Internet security. As the cloud metaphor displaces the concept of proprietary point-to-point networked servers, the key to its value can be found in the interoperability of service protocols. Securing these connections requires understanding and deploying standards such as TLS HSTS, CT, CSP, DMARC, and FIDO. Each protocol addresses specific security concerns encountered when you extend your security perimeter to include external cloud services. Developing and deploying technologies like these requires a holistic view of the security landscape, and working within a robust Internet security ecosystem.

    Key Talking Points:

    - Cloud security relies on standardized Internet security protocols.

    - Developing Internet security protocols requires multistakeholder involvement.

    - Key areas of focus include securing: transport, content, communication, and authentication.

    - Case studies presented in developing CT, CSP, DMARC, FIDO, and TLS 1.3

    - Internet security is constantly evolving; adapt or perish.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Get Rid of the Fear: A Practical Approach for Using DLP to Manage Risk
  • Live at: Apr 5 2012 5:00 pm
  • Presented by: Andrew Forgie, CISSP Websense Director of Product Marketing – Data Security
  • From:
Your email has been sent.
or close
You must be logged in to email this