Video series: Securing data in motion

Spire Security's Pete Lindstrom discusses enterprise best practices for securing corporate data in motion.

In the special four-part video presentation below, Pete Lindstrom, research director for Spire Security, an industry analyst firm focused on information security issues and market research, discusses enterprise best practices for securing corporate data in motion.

Use the summary briefs below to jump to full descriptions of each video.


VIDEOS FEATURED IN THIS SERIES  
PART 1: Learn the tools and techniques needed to protect against data leakage.

PART 2: Learn which steps to take to ensure corporate data is properly secured.

PART 3: Learn how to keep data under wraps within the framework of a comprehensive information risk management strategy.

PART 4: Learn why data protection also encompasses data retention, e-discovery, integrity and other related concerns.

ABOUT Pete Lindstrom.


PART 1: SECURING DATA IN MOTION
Information can escape from your organization through every endpoint and device, and as an information security specialist, it's your job to make sure that data doesn't get into the wrong hands -- hands that could cause your company's trade secrets to become public knowledge. Even worse, your customer's data could leak out and next thing you know, you are facing a law suit.

In part one of this data protection video series, Spire Security's Pete Lindstrom discusses:

  • How a layered defense aligns with content management, role management and applications
  • The critical non-technical controls that also help to keep data confidential
  • And more

    PART 2: SECURING DATA MOTION
    Data protection has become a top concern for today's enterprises. As more companies make headlines for data breaches and lost customer information, the need to properly secure company and customer data is at an all-time high.

    In part two of this data protection video series, Spire Security's Pete Lindstrom discusses:

  • The steps to take in order to implement a successful data protection strategy
  • The benefits of automation and how it can assist in data protection and compliance
  • Types of DLP functions and the benefits of each

    PART 3: SECURING DATA IN MOTION
    Do you cringe when you read about a lost laptop? Are you nervous that your Internet connection might be a giant intellectual-property sieve? Despite widespread regulatory and contractual stipulations for data protection, chances are that your organization hasn't developed a wholly effective architecture for thwarting sensitive information leakage.

    In part three of this video series, Spire Security's Pete Lindstrom evaluates various protection technologies and strategies within the framework of a comprehensive information risk management strategy.

    PART 4: SECURING DATA IN MOTION
    In part four of this video series, Spire Security's Pete Lindstrom evaluates various protection technologies and strategies and discusses:

  • Why data loss protection is part of a larger information risk management problem that also encompasses data retention (e-discovery), integrity and other concerns
  • What protection technologies make sense in various security layers -- perimeter, identity and access, point-of-use and repositories

    About Pete Lindstrom
    Pete Lindstrom is Research Director for Spire Security, an industry analyst firm focused on information security issues and market research. Lindstrom combines Fortune 500 corporate security experience with audit and consulting work for Coopers & Lybrand (now PriceWaterhouseCoopers) to offer clients a real-world view to evaluating, selecting and implementing the latest security technologies for enterprises.

    Prior to his corporate and consulting career, Lindstrom held a variety of IT and finance-related assignments in the United States Marine Corps. He has a Bachelor of Business Administration from the University of Notre Dame and is a Certified Information Systems Security Professional (CISSP) and former Certified Information Systems Auditor (CISA).

  • This was first published in November 2008

    Dig deeper on Enterprise Data Governance

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close