Overcoming Unstructured Data Security and Privacy Choke Points

HealthcareInfoSecurity

Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? What are the latest methodologies and technologies security and privacy executives should consider to protect their sensitive data and comply with ever-increasing and pervasive privacy regulations such as GDPR and CCPA. Join Deborah Kish, former Gartner data security analyst, as she shares insights gleaned from hundreds of sessions with CISO, CIO, CDO, CPO and CCOs to offer an insider's playbook to implementing an unstructured data security and privacy program.
Watch Now

Spotlight

Palantir’s Secure Collaboration offering is designed to enable secure information sharing in classified environments between U.S. allies and mission partners.

OTHER ON-DEMAND WEBINARS

Bridging the gap between on-prem and AWS security

cisco

As more organizations use a combination of their on-premises network and Amazon Web Services (AWS) to deliver services and applications, they are struggling to ensure their workloads are secure and compliant. More importantly, they need a way to satisfy these requirements in an efficient, cloud-native way to ensure security is effective.
Watch Now

Navigating the Modern Security Landscape

As cyber criminals grow bolder and more sophisticated, their methods evolve. Join Allen Jenkins, InterVision’s CISO & VP of Cybersecurity Consulting, as he explores the modern security landscape. Allen will discuss recent cybersecurity attacks – including a synopsis of the attack, its impact and deconstructing how the attack happened – and a review of mitigation steps that could help organizations prepare for and respond to these types of attacks, including:
Watch Now

How to Spot a Phishing Email – 5 Signs to Look Out For

MediaPRO

This attempt went on to ask why the sender wouldn’t pay an “invoice” attached to the email. Our IT staff later confirmed this attachment carried a ransomware payload. Like the confusing influx of different Oreo flavors in recent years (cotton candy Oreos, really?), the variety of phishing email attempts has blossomed. The “shock and awe” method described above is not a new tactic, though the use of vulgarity seems to be a relatively new variation. Fake shipping confirmations. Tax-related W-2 requests. Emails requesting password resets for social media accounts, online banking, you name it. These are just a few ways scammers use social engineering to bypass technological safeguards and compromise sensitive data.
Watch Now

Understanding and complying with RBI’s New Email Cybersecurity guidelines 2019

Mithi

In this Value-packed webinar, where Mithi, with a decade+ of experience in meeting email compliance requirements for all of its BFSI customers, Shared key elements of the recently released. "Email security guidelines 2019, by RBI" For banks, email has become the primary form of communication with customers, partners and other banks, carrying critical, private information such as bank statements, transaction confirmations, notifications, answers to queries by customers, and more.
Watch Now

Spotlight

Palantir’s Secure Collaboration offering is designed to enable secure information sharing in classified environments between U.S. allies and mission partners.

resources