Personal data privacy is becoming a bigger priority in the enterprise and we all bear responsibility for safeguarding our employees, customers, partners, organisational structures, and reputations. Ineffective or nonexistent privacy protection programmes expose organisations to significant risks, both from a financial and legal perspective. A recent Titus survey revealed some unsettling data; •On average, 22% of emails containing personal data were misidentified by survey respondents •30% of respondents did not consider sensitive health information to be personal data •13% of respondents did not consider a credit card number to be personal data •A company with 1,000 employees might mishandle 2+ million emails/year A prime example of how easily sensitive data can be leaked took place recently in the UK, where more than 1,000 notable figures had their home and work addresses posted on a government website. The post was meant to simply highlight people on a new year honors list. Instead, sensitive personal information was made public for about an hour. While some organizations have made efforts to build a culture of privacy, many challenges remain. So, what can be done? Join Jamie Manuel, Titus VP of Product Management, to discuss best practices around data privacy in the enterprise. In this webinar you will learn how to: •Use automated technology solutions to prevent internal data leakages •Optimize your security ecosystem and avoid workflow bottlenecks •Use machine learning to reduce false positives


14:00 - 15:00 hs GMT+1


ISF:Managing Cyber Security for CISOs
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 772 webinars
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020