Hi [[ session.user.profile.firstName ]]

Sensitive Data Loss is NOT Inevitable

Webinar: Learn how to prevent the inevitable intrusions from compromising sensitive data! There is no silver bullet, but there is a solution.

It’s widely accepted that perimeter breaches are inevitable – the bad guys are getting in. There is no silver bullet and there aren’t enough dollars in any IT security budget to address every vulnerability. But the loss of sensitive data from a breach is NOT inevitable.

Data Loss Prevention (DLP) is a proven solution that stops the theft of sensitive data. The problem is, DLP is not widely deployed. Why? Put simply, DLP is hard. But just because it’s hard, doesn’t make it a less necessary component of your security strategy.

In this webinar, Dan Geer and featured speaker Heidi Shey of Forrester will discuss:
• Why and how CISOs need to get past the DLP horror stories and limited usage to prevent the inevitable intrusions from compromising sensitive data
• What’s required for DLP to be a success
• New DLP solution deployment options that get you all the data protection, without the deployment and management headaches.
Recorded Feb 12 2015 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dan Geer, CISO, In-Q-Tel & featured speaker Heidi Shey of Forrester
Presentation preview: Sensitive Data Loss is NOT Inevitable

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Top 5 Questions About Advanced Cyber Threats Recorded: Jan 20 2016 52 mins
    Patrick Upatham, Global Director, Advanced Cyber Security & Bill Bradley, Director Product Marketing, Digital Guardian
    Threats to your organization’s sensitive data are evolving. Attackers are modifying their tactics, their techniques, and their procedures. How can your organization better detect and respond to these threats? Join Patrick Upatham, Digital Guardian’s Global Director, Advanced Cyber Security to hear how the threat landscape is shifting and how your organization can be better prepared to handle the threats.

    Watch this webcast to learn:
    • How do Advanced Threats and Advanced Persistent Threats differ?
    • What are the typical indicators of compromise or attack; how effective are they?
    • Why traditional response options are often ineffective, at best.
  • A Zero-Day Agnostic Approach to Defending Against Advanced Threats Recorded: Dec 9 2015 51 mins
    Eric Hanselman, Chief Analyst, 451 Research & Dave Karp, VP Technical Enablement, Digital Guardian
    As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • Tips to Build Your Data Protection Business Case Recorded: Nov 18 2015 62 mins
    Heidi Shey, Senior Analyst, Forrester Research; Bill Bradley, Director of Product Marketing, Digital Guardian
    Data protection has reemerged as a top solution to the increasing number of data breaches. But how do you persuade your leadership team to adopt a new security technology? Join Forrester Research and Digital Guardian as they discuss the steps to build a business case for data protection, where to gain allies throughout the organization, and how to effectively communicate your business case.

    Watch this webcast to learn:
    · How to establish the success factors for a data protection program
    · How to quantify the top line and bottom line benefits of data protection
    · Who in the organization, aside from the usual suspects, to get on board early in the project timeline
  • 451 Research: Why Data Loss Prevention is Hot Again Recorded: Oct 29 2015 60 mins
    Garrett Bekker, Senior Security Analyst at 451 Research William Bradley, Director of Product Marketing, Digital Guardian
    According to 451 Research, "interest in data security is rising, and one of the earliest approaches to securing data - data loss prevention - is coming back in full force."
    Join this webinar to learn why DLP is "back in vogue" with 451 Research predicting the DLP market growth to $1.7B by 2019 - and why you should consider it as part of your security mix.

    Topics covered:
    - The factors that are making DLP a security spending priority
    - Understanding what DLP is and isn't
    - The challenges of DLP
    - Why not all DLP tools are created equal
    - Key items to consider when selecting a DLP offering
  • Meaningful Data Protection in 90 Days with a Gartner Magic Quadrant Leader Recorded: Oct 28 2015 42 mins
    Mark Stevens, Senior VP, Global Services, Digital Guardian
    “With the Digital Guardian Managed Security Program we achieved our phase one data protection objectives in less than 120 days. No other vendor we considered was even talking in the same terms.” Mike Ring, Senior IT Manager, Threat and Solution Architect, Jabil.
    In this webinar, Mark Stevens, Senior VP, Global Services, Digital Guardian will detail:
    •Why Digital Guardian is a Gartner Magic Quadrant leader in Content-Aware Data Loss Prevention
    •Real world examples of the reporting, analysis and insights we deliver to our customers to prevent the theft of sensitive data
    •Our delivery methodology that can get your organization to meaningful data protection in 90 days or less
  • Customer Spotlight: How Redner's Markets Secures Their POS Systems Recorded: Sep 24 2015 30 mins
    Bill Bradley from Digital Guardian & Eric Moody from Redner's Markets
    Customer Spotlight: How Redner's Markets Secures Their POS Systems - Without Slowing Down the Customer

    Redner’s Markets needed to secure their POS systems and align with PCI requirements. They tried A/V, but the overhead bogged down their POS terminals. So they piloted Savant Protection application whitelisting in one store. Seven years and 45 grocery stores later, Savant Protection is still securing Redner’s Markets POS systems and helping maintain PCI compliance.

    Hear from Bill Bradley, Director of Product Marketing, Digital Guardian and Eric Moody, POS Systems/Data Security Manager, Redner’s Markets to learn how Redner’s Markets:

    • Made the switch from A/V to application whitelisting
    • Discovered a more efficient way of managing and updating machines remotely
    • Uses application whitelisting in PCI audits
    • Integrated Savant alert logging into their event management system to stay informed of unusual events in their POS environment
  • 12 Most Common Questions in a Client Data Protection Audit Recorded: Aug 26 2015 34 mins
    Tony Themelis, VP of Product Strategy, Digital Guardian
    Are you ready for your next security audit from one of your most important customers? This webinar will help you gauge your readiness and identify areas you need to improve.

    Sophisticated cybercriminals have identified third party suppliers and service providers as a lucrative back door to steal sensitive corporate information. Consequently, many companies are facing increasing pressure to meet stringent data protection audits from their largest clients.

    Based on our experience with a range of customers who have had to meet stringent partner data protection security audits, we’ve identified the most common data protection audit questions.
    – The 12 most common questions in a client data protection audit
    – What the client is really looking for with each question
    – Guidance on your “audit readiness”
  • Why Application Whitelisting is Essential for Advanced Threat Defense Recorded: Jul 21 2015 47 mins
    Guest Speaker: Chris Sherman, Analyst, Forrester Research
    According to Forrester, with the right approach and the right technology, application whitelisting can be an essential component for defending against evolving threats, particularly zero-day attacks that endpoint anti-malware products frequently fail to detect.

    In this webinar Chris Sherman, analyst at Forrester Research will examine:
    - The threat landscape and technology adoption trends
    - The benefits of whitelisting and how the technology has evolved
    - The challenges of application whitelisting and how to overcome them
    - The advantages of using application whitelisting in fixed function environments such as retail POS or Industrial Controls Systems
    - How to integrate application whitelisting into your overall endpoint security strategyWh

    John Fox, Director of Engineering at Digital Guardian will briefly explain:
    - How Digital Guardian application whitelisting is designed to address the key problems traditionally associated with application whitelisting
  • How Splunk + Digital Guardian Protect Data from Advanced Threats Recorded: Jun 25 2015 41 mins
    Tony Themelis, VP Product Strategy, Digital Guardian
    Attacks may be inevitable, but with Digital Guardian loss of sensitive data is not.

    This webinar will explore several customer use cases and show how Security Analysts and Incident Responders can harness the power of Splunk® Enterprise search across Digital Guardian event data to:

    - Detect threats
    - Prioritize threats
    - Respond to threats

    Examples include insider attacks and APTs, and will show how Digital Guardian data can provide valuable context for correlation with threat data from other security solutions in Splunk.
  • Sensitive Data Loss is NOT Inevitable Recorded: Jun 9 2015 62 mins
    Dan Geer, CISO, In-Q-Tel & featured speaker Heidi Shey of Forrester
    Learn how to prevent the inevitable intrusions from compromising sensitive data! There is no silver bullet, but there is a solution.

    It’s widely accepted that perimeter breaches are inevitable – the bad guys are getting in. There is no silver bullet and there aren’t enough dollars in any IT security budget to address every vulnerability. But the loss of sensitive data from a breach is NOT inevitable.

    Data Loss Prevention (DLP) is a proven solution that stops the theft of sensitive data. The problem is, DLP is not widely deployed. Why? Put simply, DLP is hard. But just because it’s hard, doesn’t make it a less necessary component of your security strategy.

    In this webinar, Dan Geer and featured speaker Heidi Shey of Forrester will discuss:

    • Why and how CISOs need to get past the DLP horror stories and limited usage to prevent the inevitable intrusions from compromising sensitive data

    • What’s required for DLP to be a success

    • New DLP solution deployment options that get you all the data protection, without the deployment and management headaches.
  • When Do Managed Security Services Make Sense? Recorded: May 27 2015 42 mins
    Guest Speaker: Ed Ferrara, Principal Analyst, Forrester Research, Mark Stevens, VP Global Services, Digital Guardian
    The importance of protecting sensitive data is gaining visibility at the C-level and the Boardroom. It’s a difficult task, made even more so by the shortage of security experts. One option that more and more companies are pursuing is the use of managed security services. This can enable them to employ sophisticated technologies and processes to detect security incidents in a cost-effective manner. Should managed security be a component of your security mix?

    In this webinar, Ed Ferrara of Forrester and Mark Stevens of Digital Guardian will discuss:

     When does it make sense to utilize managed security services

     How to the scope the services your company contracts out

     Questions to ask when evaluating managed security services providers

     The key criteria for selecting managed security providers
  • The Factors & Technologies that Drive Data Security Confidence in UK Firms Recorded: May 14 2015 60 mins
    Bob Tarzey, Analyst and Director, Quocirca
    What are the factors and technologies that engender UK Firms with the highest levels of confidence in their data security measures?

    Attend this webinar with Bob Tarzey, Analyst and Director at Quocirca, as he reviews new research that examines:

    - The confidence levels amongst UK businesses about the security of their sensitive business data
    - The three key factors that drive the highest confidence levels
    - The security technologies that help deliver these high confidence level - with the specific technologies that enable the management of complex information supply chains
    - The measures firms at the bleeding edge take to make sharing data in the cloud more secure
  • Sensitive Data Loss is NOT Inevitable Recorded: Feb 12 2015 62 mins
    Dan Geer, CISO, In-Q-Tel & featured speaker Heidi Shey of Forrester
    Webinar: Learn how to prevent the inevitable intrusions from compromising sensitive data! There is no silver bullet, but there is a solution.

    It’s widely accepted that perimeter breaches are inevitable – the bad guys are getting in. There is no silver bullet and there aren’t enough dollars in any IT security budget to address every vulnerability. But the loss of sensitive data from a breach is NOT inevitable.

    Data Loss Prevention (DLP) is a proven solution that stops the theft of sensitive data. The problem is, DLP is not widely deployed. Why? Put simply, DLP is hard. But just because it’s hard, doesn’t make it a less necessary component of your security strategy.

    In this webinar, Dan Geer and featured speaker Heidi Shey of Forrester will discuss:
    • Why and how CISOs need to get past the DLP horror stories and limited usage to prevent the inevitable intrusions from compromising sensitive data
    • What’s required for DLP to be a success
    • New DLP solution deployment options that get you all the data protection, without the deployment and management headaches.
  • Forrester Benchmarks | The State of Data Security - 2014 Through 2015 Recorded: Jan 20 2015 51 mins
    Stephanie Balaouras
    Forrester’s new research outlines budget and spending, technology adoption plans and other key data security trends for North American and European organizations for 2014 through 2015. Understanding these trends and their implications will you help you examine and adjust your own resource allocation for data security and privacy.


    In this webinar Stephanie Balaouras, Vice President, Research Director at Forrester will share survey data and customer input on:
    •The most common ways breaches occurred in the past 12 months
    •What type of data was most commonly breached in 2014
    •What are the most pressing issues for security professionals today
    •How IT security budgets were allocated in key technology areas in 2014 and what is expected for 2015
    •What are the top technologies peers are looking to add in 2015
    •Other trends to consider in your planning
  • Deploying a Data Protection Program Quickly – Best Practices for Success Recorded: Jan 20 2015 34 mins
    Michael Ring, Senior IT Manager, Threat Intelligence and Solution Architecture, Jabil
    Despite a limited budget, Jabil's small security team was under pressure from Senior Management to mature their security program - FAST! Michael Ring, IT Security Architect at Jabil shares how they deployed their data protection solution to over 40,000 users in less than 120 days.

    In this webinar, you will discover:
    • Jabil's decision to go with a Managed Security Program
    • How they got the CIO on board
    • The importance of a "fast forward" framework
    • Implementation lessons learned
    • The most valuable use cases - including a few they didn't anticipate!
    • Results to date
Digital Guardian
Digital Guardian is the only data aware security platform designed to stop data theft. The Digital Guardian platform performs across traditional endpoints, mobile devices and cloud applications to make it easier to see and stop all threats to sensitive data. For more than 10 years we've enabled data-rich organizations to protect their most valuable assets with an on premise deployment or an outsourced managed security program (MSP). Our unique data awareness and transformative endpoint visibility, combined with behavioral threat detection and response, let you protect data without slowing the pace of your business.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Sensitive Data Loss is NOT Inevitable
  • Live at: Feb 12 2015 7:00 pm
  • Presented by: Dan Geer, CISO, In-Q-Tel & featured speaker Heidi Shey of Forrester
  • From:
Your email has been sent.
or close