Expert Video: Tips on Choosing the Right DLP Tools for Your Company

February 05, 2009 Published by  SearchSecurity.com

Videocast Alert

SearchSecurity.com
ON-DEMAND VIDEOCASTS 



Confidential information can escape through every endpoint and device, exposing your network to the risks of security breaches and compliance violations.

This 4-part expert videocast series discusses how to successfully implement an effective data protection strategy and looks at key security technologies that can ensure the success of your DLP initiatives.

Click here to check this expert video series on securing data in motion:

Managing Information Risk Top Data Protection Drivers

Using Controls & Policies to Prevent Data Leakage

Tools & Techniques for Data Loss Prevention

How to Create a Comprehensive Data Protection Strategy

EXPERT VIDEOCASTS
WHEN: AVAILABLE ON DEMAND
SPEAKER: Pete Lindstrom, Senior Analyst, Burton Group
SPONSOR :   Symantec Corporation
   Iron Mountain Digital
   Lumension Security
   Websense
   Utimaco Safeware

ABOUT THE VIDEOCASTS:
Managing Information Risk Top Data Protection Drivers
Check out Part 1 of this videocast series and learn about:
  • The drivers behind maintaining data confidentiality and tips for addressing these challenges
  • Critical non-technical controls that can help your company keep data secure
VIEW VIDEOCAST PART 1

Using Controls & Policies to Prevent Data Leakage
Watch Part 2 of this series for information about:

  • Expert advice on the steps that your company should take when implementing a data protection strategy
  • Types of DLP functions and how your organization benefit from each
VIEW VIDEOCAST PART 2

Tools & Techniques for Data Loss Prevention
In Part 3, learn more about:

  • Available data protection technologies and key features of each option
  • Expert tips for integrating these tools into your company's infrastructure for a comprehensive risk management plan
VIEW VIDEOCAST PART 3

How to Create a Comprehensive Data Protection Strategy
Check out Part 4 of this videocast series and find out more about:

  • How effective data protection encompasses data retention, eDiscovery, integrity, and other related concerns
  • Why DLP is part of a larger information risk management problem and how you can successfully overcome these challenges
VIEW VIDEOCAST PART 4


ABOUT THE SPEAKER:
Pete Lindstrom, Senior Analyst, Burton Group

Pete Lindstrom covers security metrics, risk management, Web 2.0/SOA/Web services security, securing new technologies (virtual, grid, nanotech, etc.) for Burton group. He has conducted numerous security audits and security consulting projects at Fortune 500 companies including American Home Products (Wyeth) and GMAC Mortgage, and the United States Marine Corps as a consultant for Coopers & Lybrand (now PriceWaterhouseCoopers). He was the former research director for Spire Security. Prior to that, he was an analyst with Hurwitz Group. Pete is a frequent industry IT speaker and contributing writer on security topics. He serves on the editorial advisory board of Information Security Magazine and is a Certified Information Systems Security Professional (CISSP) and former Certified Information Systems Auditor (CISA).





VIEW WEBCASTS 
Get informed. Check out all our available webcasts to get the information you need to make the right IT Business decisions from leading industry experts and vendors.

View all Webcasts

  A B O U T   T H I S   A L E R T
TechTarget
Contact us:
SearchSecurity
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

This e-newsletter is published by SearchSecurity.com, a targeted Web site from TechTarget, The IT Media ROI Experts and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals.
Copyright 2009 TechTarget. All rights reserved.

If you no longer wish to receive Webcast Alert from SearchSecurity.com go to unsubscribe: http://searchSecurity.techtarget.com/u?track=NL-100&em=sekhargreen%40gmail.com&uid=4946246&eid=687612&

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.