Data Protection Strategies to Adopt This Year

Sign-Up to Access Recording

If we've learned anything in the last few years about practical data security, it’s that sweating the basic stuff pays off. Good password hygiene, employee security training, folder permissions that reflect the real world, multi-factor authentication, and security operation practices that spot unusual activities from ordinary users should be on everyone’s shortlist. Unfortunately, not enough organizations have put these into practice.

From CISOs to SecOps teams, find out how data protection is evolving and what you need to do to keep up.

With the knowledge that attacks can and will happen, it’s crucial to look at what can be done to contain any damage and ensure that the risk and spread of an attack are mitigated.

In this webinar, we will go through:

  • Identifying sensitive files, services and apps
  • Limiting the attack surface
  • Detecting stealthy LoL attacks
  • Responding to threats and CIRCIA Reporting Requirements
  • What's important in 2022
  • Data protection case study using Lepide

The webinar will run for approximately 45 minutes with time at the end for a Q&A.

Phil Robinson
Phil Robinson

Head of Marketing

Dan Goater
Dan Goater

Pre-Sales Engineer