mlns='http://www.w3.org/1999/xhtml'>
Key strategies, processes and tech needed to mitigate the worst data breaches
Learn the processes used to stop data leaks, particularly those that are accidental Become familiar with tools that can be used to prevent insider leaks Hear about the practices you can use to respond to an insider data leak Receive recommendations on how to stop end users from leaking critical data |
|
|
|
Dan Costa Deputy Director of the National Insider Threat Center CERT Division of the Carnegie Mellon Software Engineering Institute |
Todd Thorsen Director, Information Security, Risk Management and Compliance Code42 |
|
|
|
Register through this promotion and attend the live webinar on December 10, 2020 for your chance to receive a $10 Amazon.com gift card. Valid for the first 25 live attendees in the U.S and Canada. This offer is not sponsored, endorsed or administered by Amazon.com®. | Having trouble viewing this email? View Web Version |
|
|
|
|