Detecting and Preventing Insider Data Leaks

While malicious insiders often get the headlines, most enterprise data leaks are accidental -- caused by end users who fail to follow corporate security policy or try to work around it. In this webinar, experts discuss methods for detecting and preventing risky or anomalous end user behavior, as well as methods for preventing unauthorized access and transfer of data by end users. You’ll also get insight on the evolution of technology used to prevent accidental data leaks, such as data leak protection (DLP) and alternatives.

On Demand
1h 00min

Attend this webinar and you'll:

  • Get an overview of the most common causes of enterprise data leaks
  • Learn why most data leaks are accidental, not malicious
  • Gain insight on the tools and practices that can prevent data leaks
  • Find out how to detect rogue users who are trying to steal your data
  • Get advice on how to build policies and practices that will stop leaks in the future

Featured Speakers

  • Dr. Jason Clark
    Dr. Jason Clark

    Dr. Jason Clark is a subject matter expert in cyber security with more than 15 years of real-world experience within the intelligence community, academia, and industry. His main area of interest is researching and analyzing better methods to detect, deter, and mitigate insider threats. He helped develop insider threat programs while also helping to improve already mature programs. Jason also holds a CISSP and is a member of IEEE and ACM. He has served on a number of program committees and has presented his published work at a variety of conferences around the world. Jason completed his doctorate in Information Technology at George Mason University with a focus on cyber-crime under the advisement of Dr. Damon McCoy. He also holds two Master’s degrees in Information Technology from Rensselaer Polytechnic Institute (RPI) and Computer Forensics from George Mason University. He holds a Bachelor of Science from Syracuse University in Information Technology & Management with a minor in Economics.

  • Todd Thorsen, CISSP, CISM and CIPP/US
    Todd Thorsen, CISSP, CISM and CIPP/US
    Director of Information Security, Risk Management and Compliance

    Todd Thorsen, CISSP, CISM and CIPP/US – is an Information Security leader with more than 10 years experience in a variety of roles. Todd’s passion for security developed at Target where he led the Enterprise Third Party Security and Privacy team. Currently, Todd is the Director of Information Security, Risk Management and Compliance at Code42 Software, Inc. In addition to his other security and compliance responsibilities, Todd is responsible for leading Code42's Insider Threat Risk Program.

  • Joan Goodchild
    Joan Goodchild
    Senior Editor
    Dark Reading

    Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online.

Sponsored By