sponsored by SearchSecurity.com
Posted:  14 Jun 2013
Premiered:  17 Jun 2013
Format:  Multimedia
Type:  Virtual Environment
Language:  English

No matter how many systems, policies, or other controls you put in place, you can't stop workers from making mistakes that put data at risk. In order to mitigate your vulnerability, you need a comprehensive Data Loss Prevention (DLP) program that can identify potential leaks.

But the success of your DLP relies heavily on you and your organization. For instance, the maturity of your organization's data governance is heavily influential on its success.

Dive into this SearchSecurity.com classroom to learn the difference between suite and point product approaches. Find out how to assess what to focus on within your own organization, and learn the pitfalls in DLP implementation. Lessons include:

  • The realities of DLP
  • Lessons learned from real-world DLP technology deployments
  • Being street smart with DLP


Kevin Beaver
Information Security Consultant ,  Principle Logic LLC

Kevin Beaver is an information security consultant, expert witness, author and professional speaker at Atlanta-based Principle Logic LLC. With over 23 years of experience in the industry, he specializes in performing independent security assessments revolving around minimizing information risks. Beaver has authored/co-authored 10 books on information security, including The Practical Guide to HIPAA Privacy and Security Compliance and Hacking For Dummies.         

Data Loss Prevention (DLP) | Data Management | Data Recovery | Data Security | Data Stewardship | Endpoint Security | Information Security | Security | Security Management | Vulnerability Management

View All Resources sponsored by SearchSecurity.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement