Donec leo tortor, feugiat non molestie eget, semper eu quam. Suspendisse nec erat eu nunc porttitor volutpat nec molestie arcu. Nam pharetra id odio in hendrerit.
Join us for an interactive workshop designed to help organizations combat data loss and insider risk. You’ll get an exclusive hands-on experience with Proofpoint products, hear best practices for protecting people and defending data, and learn how to detect, investigate, respond to and stop potential insider threats and data loss incidents.
Remote work, combined with cloud adoption and unprecedented employee turnover, has created a perfect storm for organizations trying to protect their most strategic and sensitive data. Insider threats are the top cybersecurity concern among CISOs globally. As the Data Loss Prevention (DLP) and Insider Threat Management (ITM) markets converge, a people-centric approach is required to fuel your cybersecurity strategy. The primary objective of both sets of technology is to prevent data loss, whether accidental or intentional, and misuse of data. DLP monitors email and file activity and leverages content scanning and behavioral analysis to determine whether users are handling sensitive data according to corporate policy. ITM monitors user activities such as application usage, user input/output, website access and file movement. It also captures screenshots of high-risk activity for visual evidence to accelerate investigations.
Join us at Proofpoint Discovery, where you’ll get hands-on experience with Proofpoint products. In this free workshop, you will learn:
You'll receive this badge upon completion of the Proofpoint Discovery: Hands-on Lab - Combat Data Loss and Insider Risk, designed to help organizations combat data loss and insider risk.
This event is suitable for information security decision-makers, including: Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). This event is not open to channel or technology partners.
NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.