Governance & Risk Management , Insider Threat

OnDemand Webinar | How to Mitigate Insider Data Breaches

How machine learning and advanced DLP technology can mitigate insider data breaches...

People cause data breaches every day. That simple statement hides layers of complexity, compliance issues, and stress for CISOs and their security teams. While we may be able to 'logically' explain malicious breaches by linking them to motivations such as financial gain, it's often more difficult to understand and anticipate incidents caused by well-intentioned employees. The staff member who, for example, has too many things to do and sends an email to the wrong person. Or the person who feels they need to share information just to get their job done, choosing not to apply security or using unapproved channels.

This webinar explores the psychology behind these breaches, and what technology can do to prevent incidents caused by employees sharing sensitive data via email. In particular, the session examines developments in machine learning and advanced DLP technologies that can determine the risk of a data breach in real time to prevent unauthorized disclosure and enforce security for assured compliance.

Watch the webinar and learn about:

  • Why well-meaning employees cause data breaches;
  • The most common email data breach incidents;
  • How machine learning and advanced DLP technology can prevent breaches and improve protection for shared data.

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 34 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.