WEBINAR SERIES - PART 4
Preventing Data Loss from Compromised Users
ON DEMAND
Recorded on 11th June 2025
- Who exactly is your adversary? Let’s talk about the rogues' gallery and the common tactics they use.
- How does a user become compromised? Understand the ways in which employee credentials are stolen.
- What options do you have to prevent this from happening? Learn the practical options to stop credential theft.
- What happens if they are in your organisation already? What detection mechanisms are there? How do you stop it and how do you clean up afterwards?
- What does ‘good’ look like? If you had a magic wand, what would your resilient data security posture look like?