WEBINAR SERIES - PART 4

Preventing Data Loss from Compromised Users

ON DEMAND

Recorded on 11th June 2025

  • Who exactly is your adversary? Let’s talk about the rogues' gallery and the common tactics they use.
  • How does a user become compromised? Understand the ways in which employee credentials are stolen.
  • What options do you have to prevent this from happening? Learn the practical options to stop credential theft.
  • What happens if they are in your organisation already? What detection mechanisms are there? How do you stop it and how do you clean up afterwards?
  • What does ‘good’ look like? If you had a magic wand, what would your resilient data security posture look like?