| ON-DEMAND VIDEOCASTS | | | | | | Confidential information can escape through every endpoint and device, exposing your network to the risks of security breaches and compliance violations. This 4-part expert videocast series discusses how to successfully implement an effective data protection strategy and looks at key security technologies that can ensure the success of your DLP initiatives. Click here to check this expert video series on securing data in motion: Managing Information Risk Top Data Protection Drivers Using Controls & Policies to Prevent Data Leakage Tools & Techniques for Data Loss Prevention How to Create a Comprehensive Data Protection Strategy
| | EXPERT VIDEOCASTS | ABOUT THE VIDEOCASTS: Managing Information Risk Top Data Protection Drivers Check out Part 1 of this videocast series and learn about: - The drivers behind maintaining data confidentiality and tips for addressing these challenges
- Critical non-technical controls that can help your company keep data secure
VIEW VIDEOCAST PART 1 Using Controls & Policies to Prevent Data Leakage Watch Part 2 of this series for information about: - Expert advice on the steps that your company should take when implementing a data protection strategy
- Types of DLP functions and how your organization benefit from each
VIEW VIDEOCAST PART 2 Tools & Techniques for Data Loss Prevention In Part 3, learn more about: - Available data protection technologies and key features of each option
- Expert tips for integrating these tools into your company's infrastructure for a comprehensive risk management plan
VIEW VIDEOCAST PART 3 How to Create a Comprehensive Data Protection Strategy Check out Part 4 of this videocast series and find out more about: - How effective data protection encompasses data retention, eDiscovery, integrity, and other related concerns
- Why DLP is part of a larger information risk management problem and how you can successfully overcome these challenges
VIEW VIDEOCAST PART 4 ABOUT THE SPEAKER: Pete Lindstrom, Senior Analyst, Burton Group Pete Lindstrom covers security metrics, risk management, Web 2.0/SOA/Web services security, securing new technologies (virtual, grid, nanotech, etc.) for Burton group. He has conducted numerous security audits and security consulting projects at Fortune 500 companies including American Home Products (Wyeth) and GMAC Mortgage, and the United States Marine Corps as a consultant for Coopers & Lybrand (now PriceWaterhouseCoopers). He was the former research director for Spire Security. Prior to that, he was an analyst with Hurwitz Group. Pete is a frequent industry IT speaker and contributing writer on security topics. He serves on the editorial advisory board of Information Security Magazine and is a Certified Information Systems Security Professional (CISSP) and former Certified Information Systems Auditor (CISA). | | | VIEW WEBCASTS | | | Get informed. Check out all our available webcasts to get the information you need to make the right IT Business decisions from leading industry experts and vendors.
> View all Webcasts | | | | | |