Getting Started with Information Protection
Recorded live on August 3, 2023
Protecting sensitive data has gotten more complicated and challenging due to the modern way of working. To protect an organization’s crown jewels, a systematic approach is needed to bring together people, process, and technology. What’s more, a successful DLP and Insider Threat Management (ITM) program goes beyond the Security team to include HR, Legal, and Compliance. All must work together toward a common goal: protecting data and decreasing risk to the business.
Watch our 30-minute webinar, the first in a two-part series, to learn about:
- The importance of taking a people-centric approach to insider threats and data loss
- The steps needed to set-up a DLP and ITM program Approaches for balancing privacy and productivity
- Tools used to manage data loss and insider threats and required capabilities
This is part one of a two-part series, Getting Started with Information Protection.