Hi [[ session.user.profile.firstName ]]

Data Loss Prevention Doesn't Need to Be Daunting

Reported data breaches continue to increase year on year and regulatory requirements which aim to stem the tide of data leaks don’t seem to be preventing this ever-growing problem. We all know that we need to be protecting our organisations' confidential information from data leaks as part of the overall IT security strategy, but how much time and resources can you spare to implement a complex Data Loss Prevention (DLP) solution in your organisation?

Without a DLP solution your organisation’s most confidential data is at risk of being inadvertently leaked over email, or maliciously posted to public Web sites, for example. And if leaks are already happening, you probably wouldn’t know about it.

Register now for:

•A step-by-step guide on how to combat threats from inside and outside your organisation
•Practical advice on how deploying smart Web and Email security solutions will give you the control you need to proactively and productively exchange information without worrying about harmful data leaks.

Ed Rowley has been with M86 Security since April 2007. With over ten years of extensive sales engineering and technical expertise in IT security Ed plays a pivotal role in Product Management at M86. His main role is to facilitate the inclusion of customer feedback and requirements into the product development roadmap and he is also the global product manager lead for M86’s email security solution - MailMarshal SMTP. Prior to M86, Ed held technical and sales engineering positions in Sophos, CipherTrust and Secure Computing.
Recorded Aug 5 2010 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ed Rowley, Product Manager, M86 Security
Presentation preview: Data Loss Prevention Doesn't Need to Be Daunting

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Software Defined Segmentation at the Edge Feb 12 2020 10:00 pm UTC 60 mins
    Predrag "Pez" Zivic, Security Solutions Architect, Pensando Systems
    A lot of organizations are trying to implement some kind of segmentation in their data centers. Different approaches to segmentation deployment have exposed many challenges. During this talk approach to segmentation at the edge will be considered. When implementing segmentation at the edge disruption to existing infrastructure is minimal and performance of the network is improved. Attendees will learn about this new software defined segmentation at the edge approach benefits.
  • SOC (R)Evolution Feb 12 2020 6:00 pm UTC 60 mins
    Carlos Valderrama, SOC Director, Proficio
    The Security Operations Center was born from its parent, the Network Operations Center, inheriting its philosophy, structure, methodologies and even roles. The SOC, of course, has been evolving over the last few years but only by updating old concepts, technologies, processes and roles coming from the NOC.

    In 2020 is when we're going to start the SOC Revolution, being independent from its parent, creating its own model (new roles, new technology and new processes), being proactive instead of reactive, risk and threat-based and becoming even more strategic: a business loss safeguard and growth enabler for all the organizations globally.
  • [PANEL] IoT Security in 2020 Feb 12 2020 4:00 pm UTC 60 mins
    Peter Wood, Terence Jackson, Brian Russell, Kalani Enos, & Alexandre Blanc
    With the proliferation of the Internet of Things, IoT devices are often added into enterprise environments without due consideration for the security and privacy risks they pose to the business. Oftentimes, IT security teams do not have full visibility into how many IoT devices are connected to the network. This creates security gaps, as IoT devices are notoriously vulnerable to hacks and attacks.

    Join this interactive panel experts to learn about how enterprises can enhance endpoint, and therefore IoT security.

    Attendees will learn more about:
    - IoT and today's enterprise
    - What's on your network? How do you evaluate IoT devices?
    - Why visibility is key
    - Controlling access to your IoT environment
    - Vendor risk and holding vendors accountable for their IoT equipment
    - Areas for automation and where to reduce your IT security team's involvement
    - Patching and upgrading
    - Expert recommendations for enhancing IoT security

    Peter Wood, Partner, Naturally Cyber LLP (Moderator)
    Terence Jackson, CISO, Thycotic
    Brian Russell, IoT Working Group Co-Chair, Cloud Security Alliance (CSA)
    Kalani Enos, Founder & CEO, KEnos Technologies LLC
    Alexandre Blanc, Director of Security, Adaware (an Avanquest company)
  • Don’t Get Kicked While You're Down! Is your BCP (Cyber) Battle-Tested? Feb 11 2020 6:00 pm UTC 60 mins
    Shinesa Cambric, CISA, IT Security and Identity Governance Architect, Fossil Group Inc.
    Many businesses have put tremendous effort in automating processes and
    security controls that protect their data. However, in the case of a disaster, your business continuity plan (BCP) likely relies on manual processes that may open a side door to threat actors and leave your business and data more vulnerable than before.

    Learn the things you should be considering as part of your BCP to help keep your data protected.
  • [PANEL] Proactive Security Strategies and Best Practices Feb 11 2020 4:00 pm UTC 60 mins
    Roselle Safran, Sean Webb, Michelle McLean, Michelle Drolet & Chris Calvert
    In today’s business landscape it is important to take a proactive approach to security rather than a reactive approach. Join leading security experts as they discuss the safest ways to protect your organisation in 2019 and beyond.

    Join this Q&A panel to learn more about:

    - Key organisational benefits to practising proactive security
    - Technologies powering security
    - Best practices and recommendations for a more secure organization

    Roselle Safran, President, Rosint Labs (Moderator)
    Sean Webb, Information Security Manager, Patriot One Technologies Inc.
    Michelle McLean, Vice President of Product Marketing, StackRox
    Michelle Drolet, CEO & Co-Founder, Towerwall
    Chris Calvert, VP of Product Strategy, Respond Software
  • A Security Program's 5 Foundational Attributes: Mitigating Risk & Lowering Cost Feb 10 2020 6:00 pm UTC 60 mins
    Scott Smith, Senior Partner, Cirrus CyberSecurity Group
    Join this webinar as we discuss the foundational processes and tools associated with very successful security programs that also prevent serious incidents and events to lower the overall costs of a breach.

    Learn how prevention is the “secret sauce” to lowering costs!
  • Breach Response & Incident Response, They Both Start With a Plan Feb 10 2020 4:00 pm UTC 60 mins
    David Froud, Director, Core Cncept Security Ltd.
    The rapid rise of breach response capability as an absolute necessity has GDPR to thank/blame. But what should have been an extension of every organisation's existing incident response / disaster recovery program, is now an excuse to reach into your pockets. Like everything in security, breach response is not complicated - or even difficult in most cases - it just has to be 'appropriate'.

    In this webinar you will learn that:
    -Breach response is not a product, and it's certainly not a technology, it's a collection of procedures;
    -If you don't have decent incident response, breach response is pointless;
    -Most organisations trying to sell you breach response out of the gate are doing you no favours
    -Asking the right questions is your responsibility!
  • How To Go from Waterfall AppDev to Secure Agile Development in 2 Weeks Jan 31 2020 5:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Waterfall is based on the concept of sequential software development—from conception to ongoing maintenance—where each of the many steps flowed logically into the next.

    Join this webinar presentation to learn:
    - Why DevOps cannot effectively work in waterfall
    - How to use DevOps tools to optimize processes in either development or operations through automation

    We will also discuss what is needed to support full DevOps optimization and create a Secure Agile Development process.
  • How to Add Security in DataOps and DevOps Jan 29 2020 5:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    The emerging DataOps is not Just DevOps for Data. According to Gartner, DataOps is a collaborative data management practice focused on improving the communication, integration and automation of data flows between data managers and consumers across an organization.

    The goal of DataOps is to create predictable delivery and change management of data, data models and related artifacts. DataOps uses technology to automate data delivery with the appropriate levels of security, quality and metadata to improve the use and value of data in a dynamic environment.

    This session will discuss how to add Security in DataOps and DevOps.
  • CCPA Compliance Beyond Deadline Day Jan 28 2020 7:00 pm UTC 60 mins
    Guy Cohen | Lisa Hawke | Joanne Furtsch | Laura Koulet
    On January 1st 2020, the California Consumer Privacy Act (CCPA) is going into effect. Are you familiar with the CCPA's privacy requirements? Is your organization ready for the most far-reaching data privacy regulation in the U.S. to date? 
    Join this panel of privacy experts for an interactive Q&A session to learn more about how CCPA will impact your organization, as well as dive into the main differences between CCPA and GDPR.
    - The CCPA privacy requirements- CCPA checklist beyond deadline day
    - Data mapping: how and why it is important for CCPA and GDPR
    - Data Subject Access Requests 
    - Other key similarities and differences between GDPR vs. CCPA
    - The future of privacy and compliance in 2020 and beyond

    - Guy Cohen, Strategy and Policy Lead, Privitar
    - Lisa Hawke, VP Security and Compliance, Everlaw
    - Joanne Furtsch, Director, Deputy Data Governance Officer, TrustArc
    - Laura Koulet, Vice President, Head of Legal & Privacy, Tapad
  • The Emerging PCI DSS and NIST Standards Jan 28 2020 4:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    The Payment Card Industry Data Security Standard (PCI DSS) and the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework share the common goal of enhancing data security. This session maps PCI DSS to the NIST Framework and discuss how to align security efforts to meet objectives in both PCI DSS and the NIST Framework.

    PCI DSS is focused on the unique security threats and risks present in the payments industry

    The NIST Framework provides an overarching security and risk-management structure with security Functions, Categories, and Subcategories of actions. These Subcategories reference globally recognized standards for cybersecurity.

    Both PCI DSS and the NIST Framework are solid security approaches that address common security goals and principles as relevant to specific risks.

    We will discuss how the NIST Framework identifies general security outcomes and activities, and how PCI DSS provides specific direction and guidance on how to meet security outcomes for payment environments.

    This session will also discuss the interesting attribute based access control (ABAC) as a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment conditions against policy, rules, or relationships that describe the allowable operations for a given set of attributes. This session also provides considerations for using ABAC to improve information sharing within organizations and between organizations while maintaining control of that information.
  • Holistic InfoSec: Achieving Real Information Security Program Results Recorded: Jan 23 2020 38 mins
    Diane Jones, Director of Cyber Risk, Kalles Group
    Too often, Information Security means technical point solutions. This approach leaves enterprises exposed and management and customers disillusioned.

    Join us to learn:

    - Why security programs remain on the margins of business adoption in spite of heightened threats and acknowledged need
    - Why security by technology alone is a dead end
    - The secret sauce for a vibrant, effective information security program
  • [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense Recorded: Jan 23 2020 77 mins
    Panelists: Dr. Anton Chuvakin, Google Cloud; with Sumedh Thakar, Qualys; Roger Grimes, KnowBe4; and Vivian Tero, Illumio.
    The enterprise cybersecurity landscape is dramatically expanding in scale and complexity, and cyberattacks are growing in magnitude and impact as digital transformation increases on a global scale. From phishing scams, to ransomware attacks, to malicious breaches from state actors, the potential threat to your business is huge. According to the Ponemon Institute, the average per breach cost to a company in 2018 was estimated at $3.86 million, an increase of 6.4 percent over the previous year.

    Even though cybersecurity presents a challenge to the enterprise, you are not helpless against the bad actors who seek to cause real and costly damage to your business. A proactive, company-wide, integrated digital security strategy that addresses cybersecurity threats at all levels of your business will provide you with both the offensive and defensive capabilities you need to handle whatever comes your way. Earn 1 CPE credit by attending this educational and interactive panel webinar. Our experts will discuss why fortifying your cybersecurity strategy should be a critical priority and highlight some best practices that you can employ to stay ahead of evolving threats, including how to;

    - Understand the changing cyberattack landscape,
    - Create a company-wide cybersecurity task force,
    - Evaluate your security budget against your threat level,
    - Fortify your cybersecurity defense with systems hardening, adaptive authentication, and endpoint protection.
  • Data De-identification: Protecting Privacy While Preserving Utility Recorded: Jan 23 2020 49 mins
    John Noltensmeyer, Head of Privacy and Compliance Solutions, TokenEx
    As organizations evaluate their de-identification and data minimization practices to satisfy an expanding landscape of regulatory obligations there are a number of factors to consider. Various technologies will be considered as part of a data-centric security strategy for de-identifying and securing sensitive information such as statistical tools, cryptographic solutions, suppression, pseudonymization, generalization, and randomization. Further, we will examine the capability of these technologies to preserve business utility within a Zero Trust data security model.

    Listen to this session and you will take away:

    • An understanding of the definition of de-identification as it relates to international and industry privacy regulations, including the difference between pseudonymization and anonymization
    • A strategy for balancing privacy and security concerns with business needs, such as evaluating and prioritizing risk
    • How various methods of de-identification can help meet the privacy requirements of applicable compliance obligations
  • When Privacy Compliance "Gets Stuck": Dos and Don'ts of Privacy Operations Recorded: Jan 22 2020 23 mins
    Adrienne Allen, Head of Security GRC and Privacy, Coinbase
    Companies today are increasingly aware of their privacy compliance obligations, including the emerging requirements from recent regulations like GDPR and California's CCPA. Most companies that invest in a privacy compliance uplift spend time on policy revisions, data subject rights tooling, training, and data discovery. But after the first rush of compliance activities, the challenges of privacy operations evolve:

    - How do you get beyond point in time compliance into managing repeatable processes?
    - What existing teams and operations should privacy leverage right away, and how should this change over time?
    - How do you prioritize updates to your data subject rights tooling, whether you've custom built or outsourced?
    - How do you avoid privacy fatigue?

    This webinar will cover common areas where privacy compliance can "get stuck," and discuss ways to successfully operationalize a growing privacy program at the speed of business.

    Presenter Info: Adrienne Allen, Head of Security GRC and Privacy, Coinbase
  • Offensive vs Defensive Security Recorded: Jan 22 2020 26 mins
    Rhonda Bricco (UnitedHealth Group), Deb Doffing (Optum), Sue Perkins (Optum), Cat Goodfellow (Optum)
    US Cyber Command has undergone a significant shift in strategies away from defense and deterrence to engagement and forward disruption. We’ll discuss whether offensive cyber actions deter or invite retaliatory attacks, impacts to private industry (both positive and negative), and whether enterprise security offices should take offensive measures and if so – how far should we go?
  • Privacy-2020: A Millennial Perspective Recorded: Jan 22 2020 42 mins
    Deveeshree Nayak, IT Security Professional
    Webinar Take-Aways:

    - What millennials think about privacy and What’s their expectation?
    - Diversity in Privacy in 2020
    - Impact on Criminology and Criminal Justice System in Privacy.
    - Career in Privacy

    About the Speaker:
    Deveeshree Nayak
    Faculty, School of Engineering & Technology (SET)
    University of Washington, Tacoma

    Disclaimer: My views in this webinar are my own.
  • [Earn CPE] Critical Steps to Manage CCPA Compliance and Risk in 2020 Recorded: Jan 22 2020 77 mins
    Panelists: K Royal, TrustArc; Ilia Sotnikov, Netwrix, Dr. Else van der Berg, Datawallet; and Harold Byun, Baffle.
    The California Consumer Privacy Act of 2018 (CCPA) is arguably the most expansive privacy law in U.S. history and will become enforceable in just a matter of months. The CCPA introduces new privacy rights for consumers and will force companies that conduct business in the State of California to implement structural changes to their privacy programs.

    The new rights given to California consumers are similar to the rights provided in the European Union’s General Data Protection Regulation (GDPR). The CCPA also subjects non-compliant businesses to expensive fines, class-action lawsuits, and injunctions.

    On this webinar, we will examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges. We will also include strategies for creating compliance programs in the midst of the unknowns, and a strategic action plan for businesses to become compliant.

    Learning objectives are to gain insights on:

    - Understanding the nuances, ambiguities and challenges of the CCPA;
    - Creating compliance programs in the midst of the unknowns;
    - Developing a strategic action plan to become CCPA compliant;
    - How to avoid expensive fines, class-action lawsuits, and injunctions;
    - Getting ahead of the curve and enabling your business with alternate data sharing and privacy preserving techniques.
  • What to expect in 2020: Regulatory Compliance in Privacy & Cybersecurity Recorded: Jan 21 2020 47 mins
    Kevin Kim, CIPP/C, CIPT, CIPM, FIP former Chief Privacy Officer, Canadian Western Bank Financial Group
    The General Data Protection Regulation (GDPR) has been making far more influence on the privacy landscape online than expected since its enactment by the European Union (EU) on May 25th, 2018.

    Google and Facebook, two of the most powerful digital platforms, were heavily scrutinized and penalized with hefty fines for their non-compliance in the European market. GDPR has also driven many countries, such as Japan, Brazil, and South Korea, to follow suit by strengthening their privacy laws. All 50 states in the United States have also joined the camp by amending their privacy laws - albeit to varying degrees - to make privacy breach reporting mandatory.

    Most notably, the State of California developed its own GDPR-style privacy law called “California Consumer Protection Act” (CCPA) and will enact in January 2020. Moreover, two federal privacy bills were recently submitted to the Congress aiming to be the very first federal-level, comprehensive privacy law in the U.S. Canada is no exception in this privacy-aware trend. The ruling liberal party made clear that modernizing privacy legislation to protect citizens online will be one of the party’s priorities.

    This presentation will talk about current trends in privacy field in terms of regulatory requirements in the U.S., Canada, and Europe, discuss what to expect in 2020, and what to do to make sure that all the organizations and institutions are compliant with applicable laws and regulations in their jurisdiction.
  • Balancing Data Privacy & Security in 2020 Recorded: Jan 21 2020 58 mins
    Dr. Christopher Pierson | Shahrokh Shahidzadeh | Michelle Drolet | George Wrenn
    How has the compliance landscape changed in 2020? Is your organization aware of the main differences in data regulations around the world?

    Join this panel of industry leaders for an interactive Q&A roundtable to get a comprehensive look into the different data privacy and security requirements. The panel will also discuss what to expect in 2020 and beyond.

    Viewers will learn more about:
    - CCPA is now in effect and what this means for you
    - The main differences between GDPR and CCPA
    - Best tools, practices, required policies and cultural game changers for commercial and government environments
    - Other data regulations on the horizon
    - Recommendations for 2020

    - Dr. Christopher Pierson, CEO & Founder, BLACKCLOAK
    - Shahrokh Shahidzadeh, CEO, Acceptto
    - Michelle Drolet, CEO, Towerwall
    - George Wrenn, CEO & Founder, CyberSaint Security

    This Q&A panel is part of Privacy Month.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Data Loss Prevention Doesn't Need to Be Daunting
  • Live at: Aug 5 2010 2:00 pm
  • Presented by: Ed Rowley, Product Manager, M86 Security
  • From:
Your email has been sent.
or close