Get Rid of the Fear: A Practical Approach for Using DLP to Manage Risk

Andrew Forgie, CISSP Websense Director of Product Marketing – Data Security
CIOs don’t need to be convinced about data loss protection. Compliance, financial implications, brand reputation are all factors that drive this need. The real problem is that people are afraid of failure and wasting time, money, resources. They've heard about the operational nightmares, the complexity and failed deployments over the last several years. In addition, RSA and Symantec both had data stolen publically, implying the integrity of the solutions’ value is uncertain.

During this interactive session attendees will receive valuable insight on how security works and learn the secret of understanding and communicating risk. Equipped with this knowledge, Andrew will provide a practical and measurable framework for managing risk to information assets using Data Loss Prevention.

What attendees will learn:
Guiding Principles of Security and Risk Management
Data Breach Trends from the Last 6 Years
DLP Methodology and Execution Strategy
Success Factors in Addressing the Web DLP Challenge
Apr 5 2012
45 mins
Get Rid of the Fear: A Practical Approach for Using DLP to Manage Risk
Join us for this summit:
More from this community:

IT Service Management

Webinars and videos

  • Live and recorded (1961)
  • Upcoming (51)
  • Date
  • Rating
  • Views
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • Join salesforce.com customer kCura as they describe the value of having a communities platform to create frictionless service experiences with law firms, government agencies, and litigation service providers. Learn how a self-service community experience enables customers to help each other and themselves, letting service teams focus on the big issues. All of these benefits ultimately translate into a frictionless and unified experience for all their customers!

    George Orr is the VP of Client Services for kCura. He leads strategic and implementation initiatives designed to enhance the online experience of customers.
  • Over the past several years, ITSM has evolved dramatically. What was considered mature and effective Service Management a short time ago is barely sufficient today. Does this get you thinking about what is next for ITSM and whether your Service Management solution is the one to take you to the next level? Good! Let’s get together and talk about it. We will look at industry best practices, lessons learned and what you should consider in your future plans to get to the next frontier of ITSM.

    Join George Spalding, Executive Vice President of Pink Elephant, as he presents his thoughts about how we got HERE and what he believes are the next best moves to get us THERE – in the future of ITSM. George Spalding won the 2012 Ron Muns Lifetime Achievement Award from HDI, is one of the world’s most insightful IT Service Management and Support experts and has spent several years as a consultant to the White House, the Smithsonian Institute, and the Federal Bureau of Investigation. George is an ITIL Expert, he is a regular author of IT articles and white papers, and is a presenter at global ITSM conferences and events.
  • Over the past several years, ITSM has evolved dramatically. What was considered mature and effective Service Management a short time ago is barely sufficient today. Does this get you thinking about what is next for ITSM and whether your Service Management solution is the one to take you to the next level? Good! Let’s get together and talk about it. We will look at industry best practices, lessons learned and what you should consider in your future plans to get to the next frontier of ITSM.

    Join George Spalding, Executive Vice President of Pink Elephant, as he presents his thoughts about how we got HERE and what he believes are the next best moves to get us THERE – in the future of ITSM. George Spalding won the 2012 Ron Muns Lifetime Achievement Award from HDI, is one of the world’s most insightful IT Service Management and Support experts and has spent several years as a consultant to the White House, the Smithsonian Institute, and the Federal Bureau of Investigation. George is an ITIL Expert, he is a regular author of IT articles and white papers, and is a presenter at global ITSM conferences and events.
  • The Operations Bridge is “the” solution for IT Operations to effectively address the challenges they face when it comes to managing the new style of IT: complex composite applications, virtualized environments, cloud-based services, big data, and a variety of management solutions from different vendors. In this session, you will learn how the HP Operations Bridge solution allows you to take up those challenges and consolidate all your existing IT monitoring solutions, providing a unique solution to maximize efficiency and improve runtime and performance of your IT services.
  • Enterprises are realizing that the opportunity of data analytics is maximum when the data is fresh and represents the "current reality" of operations or customer experience. The business value of data dramatically falls with its age.

    As IT and line-of-business executives begin to operationalize Hadoop and MPP based batch Big Data analytics, it's time to prepare for the next wave of innovation in data processing.

    Join this webinar on analytics over real-time streaming data.

    You will learn about:
    •How business value is preserved and enhanced using Real-time Streaming Analytics with numerous use-cases in different industry verticals
    •Technical considerations for IT leaders and implementation teams looking to integrate Real-time Streaming Analytics into enterprise architecture roadmap
    •Recommendations for making Real-time Streaming Analytics – real – in your enterprise
    •Impetus StreamAnalytix – an enterprise ready platform for Real-time Streaming Analytics
  • Problem Management is a game changer. It is critical in developing real quality in service delivery. However, very few organisations actually get this aspect of ITSM working well.

    This fourth session in the ITSM Goodness series will look at how we spend too much time focussing on efficient ‘fire-fighting’ (Incident Management), rather than looking at avoiding recurrence or eradicating faults altogether - ultimately a better solution for customer and provider alike. Often there are some simple misunderstandings around what Problem Management is or what is required to make it work. Also it can be difficult to find the right people to make Problem Management happen, particularly as it is not a simple linear process that can be ‘industrialised’ like Incident Management. This session provides simple clear guidelines on what is needed and how to make Problem Management work well for your organisation.

    This 8-part monthly series is designed to provide real-time value to newcomers and take to the next level those already familiar with the approach.

    ITSM Goodness is an approach created by Barclay Rae to deliver practical, proven, successful and accessible advice and guidance for ITSM and IT professionals. The focus is clear and simple – on achieving the right business outcomes from IT, and how this is delivered, via the Customer Experience.
  • The foundation of success for any company is an outstanding customer experience, but we all know the journey toward creating an amazing service culture is a challenging one. While a great culture doesn’t happen overnight, it IS attainable (really!) with the right approach. Join Joel Daly, HOSTING’s COO, as he discusses HOSTING’s journey: the obstacles, the companies we admire, and the process we undertook to reach excellent service.
  • For many IT Service Organisations the selection of their ITSM toolset is one of the most important, and expensive, decisions they can make. Causing huge disruption and extra work as staff are moved from one system to another. The ITSM toolset is like the engine that drives an IT department and its ability to ensure work is prioritised, integrated and moved between support teams. It is utterly critical to the running of an IT department, but if its so important why do so many IT departments only keep a toolset for 3-5 years before moving to another one and starting the process again?

    Join Peter Hubbard, Principal ITSM Consultant at Pink Elephant, as he shares his experiences on what happens during an ‘out of the box’ toolset implementation program, along with his advice and guidance on avoiding typical pitfalls that many implementations could easily avoid.

    Learn about the critical importance of People, Process and Product working in harmony to make sure that your toolset selection and implementation program delivers real business value quickly.

    Learn why ‘Out of the box’ is a dangerous phrase, and there is no such thing in the real world. Peter will be join by Michael Jenkins, a veteran toolset implementer with over 20 such projects behind him as they discuss what happens in an ‘out of the box’ implementation.

    They will discuss how to pick a toolset, the value of use cases, what happens on the vendor ‘demo day’ and what sort of actions you can be undertaking prior to the chosen vendor starting their implementation in order to speed up the process and make sure that your most expensive ITSM decision returns real value.
  • There’s a sea change taking place in service and how consumer ‘journeys’ are taking place. Howard Kendall, founder of the SDI, has spent much time keeping track of what is really going on, how customer expectations are changing, and how we can use leverage this in the service desk industry.

    Join Howard for an informative discussion on how service desk can successfully rise to the challenge of delivering excellent customer service, meeting, and possibly surpassing, the expectations of the customers they support. Howard will provide some top tips that will help to win the hearts and minds of service desk customers and build stronger relationships with end-user constituents, elevating the position of the service desk within the IT organisation.
  • Channel
  • Channel profile
Up Down
  • Threat defenses: Before, during and after the point of click Recorded: Jul 8 2013 48 mins
    Produced by SC Magazine and Websense, this webcast explains how to protect against malware, advanced threats and data theft with continuous defenses before, during and after the point of click.

    This webcast outlines advanced threat stages and explains how protection in early stages can quickly block attacks, and how real-time, inline threat analysis protects against threats, data loss and data theft at the point of click. And learn how containment defenses are using sandboxing and traffic analysis to identify, profile and protect after the click. Combined, security administrators and teams are better armed to protect users, data and resources.

    Learn how threat defenses have evolved to include:

    - Global threat awareness and analysis to protect before the point of click.
    - Inline, real-time defenses during the point-of-click for protection against threats and data theft.
    - Sandboxing of malware and traffic analysis to identify and protect after the click.
    - Equal protection from both web and email attacks for office workers and remote workers.
  • Hit “Like” and Keep your Data Secure: Safe Social Media Use for Business Recorded: Mar 12 2013 45 mins
    When you consider the abundant security risks, many companies are still wary about broadly enabling social media. After all, nowadays your social media identity may be more valuable to cybercriminals than your credits cards. However, with the right tools, it is possible to be safe while being social. In this webcast, we’ll examine the latest tactics cybercriminals are using within social media to target individuals and get access to information. We’ll also discuss the importance of real-time defenses at the gateway and review Websense social controls and video categories. Other topics will include: - Seven stages of advanced threats and how social networking plays into early stages - Websense defenses for social media threats (inline, real-time, etc.) - Benefits of the Websense/Facebook partnership.
  • Seven Stages of Advanced Threats & Data Theft Recorded: Sep 27 2012 52 mins
    Targeted attacks are now well beyond traditional URL+AV defenses, and forward facing defenses do not provide containment against data theft and cybercrime call-home communications. In addition, cloud apps, mobility and remote users are increasing SSL use that is often a blind spot for many defenses. Change is the only constant in the IT security world and being educated on threat stages, defenses, and effectiveness is paramount.
  • A Proactive Approach to Modern Malware using Forensics & Sandboxing Recorded: Sep 6 2012 48 mins
    CISOs around the world are telling analysts that the majority of today’s emerging threats are bypassing their anti-virus, firewalls, and intrusion prevention solutions. In response, analysts suggest that IT needs to assume a more proactive stance. Such a shift can involve more tightly integrated defenses, strengthening in-house IT resources, and leveraging appropriate outside resources. In this webinar, Websense will discuss ways to begin this shift today including:

    - Expanding ‘inbound’ defenses to include ‘outbound’ controls
    - Options for enhancing in-house IT security expertise
    - Leveraging research-grade forensic tools such as Websense ThreatScope™

    Real-world context will be provided as an actual malware sample undergoes forensic dissection and the Websense CyberSecurity Intelligence™ service is reviewed as a concrete example of the capabilities of today’s threat intelligence marketplace.
  • Why Mobile Device Management Needs Mobile Security Recorded: Jul 11 2012 32 mins
    The consumerization of IT is hitting hard and Mobile Device Managment (MDM) needs mobile security. Personal and corporate-owned devices are flooding the workplace. Companies need to secure these devices, and they are turning to Mobile Device Management (MDM).

    But an MDM solution will not address your primary concerns around securing your data. Learn how to safely allow mobile devices in the workplace while protecting against mobile threats and data loss.
    Key topics in the session will include:

    · Mobility trends including consumerization of IT
    · Profile of a mobile user
    · Current approaches to Mobile Security
    · The Websense approach
  • A Practical Guide for Managing Today’s Targeted Phishing Attacks Recorded: Jun 20 2012 41 mins
    Phish or no phish? That’s the question that employees—and executives in particular—have been asking themselves more frequently. They’ve heard about how high profile organizations and even government agencies have fallen prey to attacks that stemmed from seemingly harmless emails. Has the door been left wide open?

    Join Websense on June 20th as we provide guidance on how you can recognize advanced threats and protect yourself from them. Attendees will gain practical insights into:

    · Recent Email Phishing Schemes

    · Telltale Signs of Advanced Targeted Attacks

    · Best Practice Principles to Educate Users

    · Technology Capabilities to Minimize Risk of Compromise
  • Get Rid of the Fear: A Practical Approach for Using DLP to Manage Risk Recorded: Apr 5 2012 45 mins
    CIOs don’t need to be convinced about data loss protection. Compliance, financial implications, brand reputation are all factors that drive this need. The real problem is that people are afraid of failure and wasting time, money, resources. They've heard about the operational nightmares, the complexity and failed deployments over the last several years. In addition, RSA and Symantec both had data stolen publically, implying the integrity of the solutions’ value is uncertain.

    During this interactive session attendees will receive valuable insight on how security works and learn the secret of understanding and communicating risk. Equipped with this knowledge, Andrew will provide a practical and measurable framework for managing risk to information assets using Data Loss Prevention.

    What attendees will learn:
    Guiding Principles of Security and Risk Management
    Data Breach Trends from the Last 6 Years
    DLP Methodology and Execution Strategy
    Success Factors in Addressing the Web DLP Challenge
  • 2012 Threat Update Recorded: Feb 27 2012 48 mins
    2011 was arguably the most surprising year in IT security history, with groundbreaking breaches at many of the world's top organizations. In this webinar we will analyze the threats and trends of 2011 while offering guidance for dealing with the evolving security landscape of the future. Key topics will include:
    Significant discoveries and events from 2011 and lessons to take away
    Detailed threat analysis by threat type, delivery, region, and more
    Statistical roll-up of top spam topics by category and email type
    Data theft and loss events and how containment defenses continue to evolve

    Websense Threat Report findings are fueled by the Websense Advance Classification Engine (ACE) and the Websense ThreatSeeker™ Network, one of the world's largest security intelligence networks with over 850 million end users providing 3-5 billion requests per day for security, data and content analysis.
  • Contextual Defenses for Web 2.0 Recorded: Feb 8 2012 36 mins
    Today’s ever-evolving Web and age of advanced persistent threats are spelling an end to static defenses focused on inbound known threats. In addition, surging trends such as consumer apps and cloud computing, social networking, plus mobility are redefining the perimeter and making real-time contextual defenses a requirement. Join Websense on February 8th as we discuss Contextual Defenses for Web 2.0 and offer guidance for how you can protect today’s empowered users from advanced malware while containing data theft. This webinar will discuss key requirements for defenses in the modern day including:

    · Inline real-time contextual defenses providing composite assessments

    · HTTPS/SSL traffic inspection at various levels depending on context

    · User and destination awareness by security zone, category, app or specific site
Webcasts for Content Security Professionals
Websense, Inc., a global leader in unified Web, data, and email content security, delivers the best security for modern threats at the lowest total cost of ownership. Our channel will include frequent webinars aimed at helping companies protect themselves against modern threats.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Get Rid of the Fear: A Practical Approach for Using DLP to Manage Risk
  • Live at: Apr 5 2012 5:00 pm
  • Presented by: Andrew Forgie, CISSP Websense Director of Product Marketing – Data Security
  • From:
Your email has been sent.
or close
You must be logged in to email this