Hi [[ session.user.profile.firstName ]]

How to Prevent Internal Data Leaks and Protect Personal Data

Personal data privacy is becoming a bigger priority in the enterprise and we all bear responsibility for safeguarding our employees, customers, partners, organisational structures, and reputations. Ineffective or nonexistent privacy protection programmes expose organisations to significant risks, both from a financial and legal perspective.

A recent Titus survey revealed some unsettling data;

•On average, 22% of emails containing personal data were misidentified by survey respondents
•30% of respondents did not consider sensitive health information to be personal data
•13% of respondents did not consider a credit card number to be personal data
•A company with 1,000 employees might mishandle 2+ million emails/year

A prime example of how easily sensitive data can be leaked took place recently in the UK, where more than 1,000 notable figures had their home and work addresses posted on a government website. The post was meant to simply highlight people on a new year honors list. Instead, sensitive personal information was made public for about an hour. While some organizations have made efforts to build a culture of privacy, many challenges remain.

So, what can be done?

Join Jamie Manuel, Titus VP of Product Management, to discuss best practices around data privacy in the enterprise.

In this webinar you will learn how to:
•Use automated technology solutions to prevent internal data leakages
•Optimize your security ecosystem and avoid workflow bottlenecks
•Use machine learning to reduce false positives

Webinar details:
Thursday 5th March 2020
1pm GMT (8am EST)
Recorded Mar 5 2020 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jamie Manuel, VP of Product Management, Titus
Presentation preview: How to Prevent Internal Data Leaks and Protect Personal Data

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Threat Horizon 2022: Digital and physical worlds collide Sep 2 2020 12:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF
    The digital and physical worlds are on an irreversible collision course. By 2022, organisations will be plunged into crisis as ruthless attackers exploit weaknesses in immature technologies and take advantage of an unprepared workforce. At the same time, natural forces will ravage infrastructure.

    In this ISF Webinar, Steve Durbin, Managing Director of the Information Security Forum, will present the key findings from the Threat Horizon 2022: Digital and physical worlds collide report, highlighting the significant threats cyber professionals should expect over the coming years and some of the key actions that they should consider now.

    The webinar will present nine potential threats driven by global events and major developments. These threats are group into three main themes:
    1.Invasive technology disrupts the everyday
    2.Neglected infrastructure cripples operations
    3.A crisis of trust undermines digital business.

    Threat Horizon 2022: Digital and physical worlds collide is the latest ISF annual threat outlook report which explores the key cyber threats predicted to impact organisations over the next couple of years.
  • Phishing and Email Security – Effectively Managing Human Vulnerabilities Apr 15 2020 12:00 pm UTC 45 mins
    Daniel Norman, Research Analyst, ISF
    In this upcoming ISF Webinar, Daniel Norman, Research Analyst at the ISF, will be discussing the psychological techniques attackers use during phishing campaigns and how organisations can improve phishing training and awareness.

    Nearly all organisations perform some kind of phishing testing on a regular basis, with varying levels of success. Many phishing campaigns are tick-box exercises, are unsuitable and punish behaviour. By understanding attacker techniques we can identify what triggers human behaviour, and thus begin developing phishing training and awareness activities that improve behaviour change.

    This webinar will teach you:
    1. About psychological weaknesses and attacker techniques
    2. Why phishing training is still important
    3. Strengths and weaknesses, and why metrics for success are so difficult.
  • Using Cloud Services Securely: Harnessing core controls Recorded: Mar 25 2020 56 mins
    Benoit Heynderickx, Principal Analyst, ISF
    Cloud computing has evolved at an incredible speed and, in many organisations, has become entwined with the complex technological landscape that supports critical daily operations. Business and security leaders already face many challenges in protecting their existing IT environment; they must now find ways to securely use multiple cloud services.

    In this ISF Webinar, Benoit Heynderickx, Principal Analyst at the Information Security Forum, will discuss the key findings in his research report Using Cloud Services Securely: Harnessing core controls. This report empowers organisations to deploy the right set of security controls and to focus their efforts on the most valuable action that will reduce the likelihood and impact of cloud-related threat events.

    Throughout this webinar, you will learn more about:

    •Critical control areas for securing cloud services
    •Practical experiences and real case scenarios for securing a multi-cloud environment
    •The importance of, and how to deploy and maintain a simple yet effective approach to using cloud services securely.
  • How to Prevent Internal Data Leaks and Protect Personal Data Recorded: Mar 5 2020 49 mins
    Jamie Manuel, VP of Product Management, Titus
    Personal data privacy is becoming a bigger priority in the enterprise and we all bear responsibility for safeguarding our employees, customers, partners, organisational structures, and reputations. Ineffective or nonexistent privacy protection programmes expose organisations to significant risks, both from a financial and legal perspective.

    A recent Titus survey revealed some unsettling data;

    •On average, 22% of emails containing personal data were misidentified by survey respondents
    •30% of respondents did not consider sensitive health information to be personal data
    •13% of respondents did not consider a credit card number to be personal data
    •A company with 1,000 employees might mishandle 2+ million emails/year

    A prime example of how easily sensitive data can be leaked took place recently in the UK, where more than 1,000 notable figures had their home and work addresses posted on a government website. The post was meant to simply highlight people on a new year honors list. Instead, sensitive personal information was made public for about an hour. While some organizations have made efforts to build a culture of privacy, many challenges remain.

    So, what can be done?

    Join Jamie Manuel, Titus VP of Product Management, to discuss best practices around data privacy in the enterprise.

    In this webinar you will learn how to:
    •Use automated technology solutions to prevent internal data leakages
    •Optimize your security ecosystem and avoid workflow bottlenecks
    •Use machine learning to reduce false positives

    Webinar details:
    Thursday 5th March 2020
    1pm GMT (8am EST)
  • Emerging Cyber Threats for 2020 Recorded: Dec 10 2019 47 mins
    Steve Durbin, Managing Director, ISF
    In 2020, the pace and scale of change, particularly in terms of technology, will continue to accelerate substantially. Organisations will find themselves caught in a vortex of economic volatility and political uncertainty far beyond the levels experienced in the past. The key separating component for those who will prosper under these circumstances will be the degree to which they are prepared to meet the challenges.

    In this webinar Steve Durbin, Managing Director, ISF will discuss how business leaders and their security teams can address the prevalent emerging threats in the context of:
    •The Race for Technology Dominance
    •Third Parties, Internet of Things (IoT) and the Cloud
    •Cybercrime
  • Securing the IoT: Taming the Connected World Recorded: Nov 18 2019 40 mins
    Andy Jones, Distinguished Analyst, ISF
    The Internet of Things (IoT) has exploded into the connected world and promises much, from enabling the digital organisation to making domestic life richer and easier.

    On Monday 18th November at 1pm BST, Andy Jones, Distinguished Analyst for the Information Security Forum, will introduce the publicly available briefing paper on the Internet of Things.

    Targeted for those who are engaged with the IoT, either in the deployment of industrial or consumer IoT or in their manufacture or retail this webcast will cover:

    1. definitions of the IoT
    2. technical characteristics
    3. fundamental security issues
    4. emerging security practice
    5. legal and regulatory landscapes
  • Beyond the Phish: A Snapshot of End-User Behaviour Recorded: Oct 23 2019 47 mins
    Gretel Egan, Security Awareness Training Strategist, ProofPoint
    Phishing is one of InfoSec's long-standing threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering?

    During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features an analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.

    We’ll share:

    - The importance of assessing and training end-users about cybersecurity threats beyond email-based social engineering
    - The strengths and weaknesses among end-users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries which provides a benchmark to compare readiness within your organization
    - A more holistic view of susceptibility by looking beyond knowledge assessments and training activities to discover how this data can differ from simulated phishing attacks
    - How you can use this information to reduce the risk of successful cyber attacks within your organization
  • Improving cyber risk conversations with the Board Recorded: Oct 16 2019 48 mins
    Simon Marvell, Partner, Acuity Risk Management
    According to McKinsey most IT and security executives use manually compiled spreadsheets to report cyber risk data to their Boards; unsurprisingly many Boards are dissatisfied with the reports they receive. Consequently, Boards struggle to get a sense of the overall cyber risk status of the organisation.

    With global spending on cyber security products and services increasing at 8.7% a year, Boards also need assurance that their budgets are being spent well.

    This webinar will provide practical examples of how, with the introduction of some quantitative risk assessment techniques, security leaders can start to improve their conversations with the Board.

    Specifically, the session will demonstrate:

    •Forecasting future financial loss exposure from cyber events
    •Prioritisation of security programmes in terms of forecast reduction in financial loss exposure
    •Evaluating the RoI of security investment proposals.
    The webinar will conclude with some suggestions on how security leaders can start to introduce these techniques and then evolve them through monitoring and continual improvement.
  • Combining human-centred approaches with AI in information security Recorded: Oct 9 2019 45 mins
    Richard Absalom & Daniel Norman
    In the majority of data breaches, human error is blamed. Humans are frequently regarded as the ‘weakest link’ in information security, but organisations have not aimed to understand the reasons why humans make mistakes and are easily coerced by attackers.

    Organisations can take both human-centred and technological steps to mitigate human fallibility: encouraging good security practice at the same time as deploying intelligent systems that learn and analyse activity and behaviour, providing alerts when an attack is imminent.

    In this webinar, ISF research analysts Daniel Norman and Richard Absalom will:

    •explain why humans are a weak link in security but also a key part of the solution – and how human-centred techniques can help
    •provide clarity on what AI really is, and what it can and cannot do for information security
    •pose questions on the extent to which AI could and should monitor networks and people to provide security.
  • Data Protection 2020 - The risk of personal data exposure Recorded: Oct 1 2019 46 mins
    Stephane Charbonneau, Founder & Chief Technology Officer for Titus
    The risk of exposure of personal data has become a growing concern to organizations globally throughout the last several years. While many organizations have made efforts to build a culture of privacy and perhaps a security ecosystem that supports that, many challenges remain on the execution of mitigating such a concern.
    For those organizations who have yet to build out such a program, and those who have done so unsuccessfully, the question becomes, how can we create a privacy program that works for our business?
    The journey to a robust privacy solution has several requirements.
    Join Stephane Charbonneau, Founder & Chief Technology Officer for Titus to learn:
    •Data Protection 2020, the risk of personal data exposure
    •How to ensure compliance with an ever-changing regulatory mandate landscape
    •How to enable a frictionless user experience and optimized workflow to your end users
    •How to tie the technologies in your privacy ecosystem together to protect your most valuable data.
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response Recorded: Aug 22 2019 44 mins
    Daniel Norman, Research Analyst, ISF
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • Optimising your SOC – put your best foot forward with threat intelligence Recorded: Jul 17 2019 47 mins
    Dr Emma Bickerstaffe, Senior Research Analyst
    Threat intelligence is an imperative element of a successful Security Operations Centre (SOC). It provides SOC analysts with situational awareness and actionable insights to accelerate security analysis and prevent security incidents.

    Drawing on the practical experiences of ISF Member organisations, Emma will share how threat intelligence can be effectively harnessed by a SOC to enable proactive decision-making.
  • GDPR One year later: Is a Risk-Based Approach to Data Privacy possible? Recorded: May 20 2019 45 mins
    Simon Rycroft, Principal Consultant, ISF and Kashif Barlas, Senior Consultant, ISF
    With businesses streamlining processes and automating customer service through outsourced arrangements, the volume and content of electronically transmitted personal data records has increased beyond all previous estimates. The sharing of special categories of data between businesses and their suppliers has become the norm, sometimes without adequate protection for the individual’s privacy in breach of the GDPR. Where there are hundreds of supplier contracts, it is not pragmatic for an organisation to review and tighten all these contracts immediately in the wake of the GDPR, however a risk-based approach can certainly reduce the compliance burden upon existing teams.

    In this seminar, we introduce the concept of a minimum viable product for this aspect of data privacy and describe how it can be aligned with an organisation’s risk appetite and agreed before prioritising and mitigating data privacy risks.
  • Threat Horizon 2021 Recorded: Apr 4 2019 47 mins
    Steve Durbin, Managing Director, ISF LTD
    Driven by demands for increased speed, automation and efficiency, organisations are about to face a period of significant technological upheaval. Digitisation promises much, and development of the next generation of technologies will bring significant benefits to business and society. To survive in the digital world organisations will have to adapt. To thrive, they will need to evolve. Exploiting digital interconnectivity, competing in the digital arena while understanding the implications of a digital cold war will all become business as usual challenges for industry over the coming months and years.

    In this webinar, Steve Durbin, Managing Director, ISF will identify the key changes to the digital landscape over the next two years, focusing on emerging threats and means of mitigating their impact.
  • What do you get when you cross a CEO and a CISO’s strategy Recorded: Mar 19 2019 45 mins
    Mark Chaplin, Principal, ISF
    While the board ‘get cyber’, questions remain around embedding cyber risk management into business strategy execution. For many CISOs, strategy alignment represents the best opportunity to engage with the board and ensure a business-driven approach to managing cyber risk.

    So how should business leaders develop, update and execute business strategy with so many cyber-related implications? How can organisations meet their business goals, against a backdrop of increasing cybersecurity costs, greater regulatory scrutiny and increased frequency and magnitude of data breaches?

    In this webinar, Mark Chaplin, Principal, ISF will discuss the significance of aligning security strategy with business strategy. Mark will draw on executive engagement, exploring the essential factors for success and highlighting the pitfalls to avoid.
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response Recorded: Feb 20 2019 45 mins
    Daniel Norman, Research Analyst, ISF
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • Emerging Cyber Threats for 2019 Recorded: Dec 11 2018 47 mins
    Steve Durbin, Managing Director, ISF LTD
    Organisations in 2019 will be increasingly faced with a hyper-connected world where the pace and scale of change – particularly in terms of technology – will accelerate substantially. Business leaders need to develop cutting-edge ways to deal with new regulation, advanced technology and distorted information.

    In this webinar, Steve Durbin, Managing Director, ISF will discuss the threats organisations will be facing in 2019 and how business leaders and their security teams can address them. The emerging cyber threats to lookout for include:

    -The increased sophistication of cybercrime and ransomware
    -The impact of legislation
    -The myth of supply chain assurance
    -Smart devices challenge data integrity

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Security in the Cloud: Identity Management, Access Control and Authentication Recorded: Oct 23 2018 44 mins
    Emma Bickerstaffe, Senior Research Analyst and Benoit Heynderickx, Principal Analyst, ISF LTD
    Organisations increasingly rely on cloud services, motivated by the benefits of scalability, accessibility, flexibility, business efficiencies and reduced IT costs. However, there are several security implications that organisations need to address, including the challenge of verifying identity and managing access to cloud services.

    Cloud services bring added complexity to identity and access management, exacerbated by the distribution of data across a myriad of applications accessed by users from multiple devices and locations. Failure to adequately implement user authentication and access control in the cloud can be exploited by attackers to gain access to users’ credentials, manipulate systems and compromise data.

    In this webinar, Senior Research Analyst Dr Emma Bickerstaffe and Principal Analyst Benoit Heynderickx will discuss identity management, access control and user authentication in the cloud environment, and consider how organisations can effectively tackle this security concern.
  • A Data Breach Prevention, Detection & Response Strategy to Combat Todays Threats Recorded: Sep 18 2018 47 mins
    Nick Frost, Principal Consultant, ISF LTD
    With the ever-increasing frequency and sophistication of security threats to organisations, business leaders need to have a comprehensive data security strategy to protect themselves. Information security practitioners have to think and plan beyond existing protection capabilities that are aimed at preventing threats only. Today's cyber security strategies need to protect an organisations mission critical assets in a way that is:

    ‒ balanced, providing a mixture of informative, preventative and detective security controls that complement each other
    ‒ comprehensive, providing protection before, during and after threat events materialise into security incidents
    ‒ end-to-end, covering the complete information life cycle.

    This will enable organisations to match the protection provided with the sophistication of threats to such mission critical information assets. This webinar will look at past and present models and share ideas on how organisations can ‘future proof’ their strategies to combat next generation threats.

    In particular in this webinar, Nick Frost, Principal Consultant at the ISF will discuss what actions can be taken to identify your most critical information assets, and how a modern day cyber security model needs to focus on prevention and detection of a data breach, and how to respond to a breach in order to reduce damage to brand and reputation.
  • Protecting Against Ransomware Recorded: Jun 6 2018 45 mins
    Nick Frost (Principal Consultant, ISF) | Raja Mukerji (ExtraHop) | Patrick Grillo (Fortinet) | Rob McGovern (LogRhythm)
    What are the lessons learned from the biggest ransomware attacks to date (Wannacry, NotPetya)? How are organizations preparing against the next big attack?

    Join top security experts for this interactive Q&A discussion on:
    - Trends in ransomware attacks
    - Backups, patches and other ways to protect your data
    - How to bolster your organization's security culture
    - Other threats on the horizon

    Speakers:
    - Nick Frost, Principal Consultant, Information Security Forum (ISF)
    - Raja Mukerji, Co-Founder and President, ExtraHop
    - Patrick Grillo, Senior Director Solutions Marketing, Fortinet
    - Rob McGovern, Technical Product Manager, LogRhythm

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
Live monthly webcasts for CISO’s and business leaders
Steve Durbin, Managing Director of ISF Ltd and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..."
We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams.

1. Emerging Cyber Threats (ISF Threat Horizon annual series)
2. The role of the CEO and business leaders in cyber security
3. Being a successful CISO
4. Cyber-attack trends
5. Critical Asset Management
6. Data breach prevention
7. Supply chain
8. Insider Threat and the role of the end user

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Prevent Internal Data Leaks and Protect Personal Data
  • Live at: Mar 5 2020 1:00 pm
  • Presented by: Jamie Manuel, VP of Product Management, Titus
  • From:
Your email has been sent.
or close