Videocast

Video series: Securing data in motion

In the special four-part video presentation below, Pete Lindstrom, research director for Spire Security, an industry analyst firm focused on information security issues and market research, discusses enterprise best practices for securing corporate data in motion.

Use the summary briefs below to jump to full descriptions of each video.


VIDEOS FEATURED IN THIS SERIES  
PART 1: Learn the tools and techniques needed to protect against data leakage.

PART 2: Learn which steps to take to ensure corporate data is properly secured.

PART 3: Learn how to keep data under wraps within the framework of a comprehensive information risk management strategy.

PART 4: Learn why data protection also encompasses data retention, e-discovery, integrity and other related concerns.

ABOUT Pete Lindstrom.


PART 1: SECURING DATA IN MOTION
Information can escape from your organization through every endpoint and device, and as an information security specialist, it's your job to make sure that data doesn't get into the wrong hands -- hands that could cause your company's trade secrets to become public knowledge. Even worse, your customer's data could leak out and next thing you know, you are facing a law suit.

In part one of this data protection video series, Spire Security's Pete Lindstrom discusses:

  • How a layered defense aligns with content management, role management and applications
  • The critical non-technical controls that also help to keep data confidential
  • And more

    PART 2: SECURING DATA MOTION
    Data protection has become a top concern for today's enterprises. As more companies make headlines for data breaches and lost customer information, the need to properly secure company and customer data is at an all-time high.

    In part two of this data protection video series, Spire Security's Pete Lindstrom discusses:

  • The steps to take in order to implement a successful data protection strategy
  • The benefits of automation and how it can assist in data protection and compliance
  • Types of DLP functions and the benefits of each

    PART 3: SECURING DATA IN MOTION
    Do you cringe when you read about a lost laptop? Are you nervous that your Internet connection might be a giant intellectual-property sieve? Despite widespread regulatory and contractual stipulations for data protection, chances are that your organization hasn't developed a wholly effective architecture for thwarting sensitive information leakage.

    In part three of this video series, Spire Security's Pete Lindstrom evaluates various protection technologies and strategies within the framework of a comprehensive information risk management strategy.

    PART 4: SECURING DATA IN MOTION
    In part four of this video series, Spire Security's Pete Lindstrom evaluates various protection technologies and strategies and discusses:

  • Why data loss protection is part of a larger information risk management problem that also encompasses data retention (e-discovery), integrity and other concerns
  • What protection technologies make sense in various security layers -- perimeter, identity and access, point-of-use and repositories

    About Pete Lindstrom
    Pete Lindstrom is Research Director for Spire Security, an industry analyst firm focused on information security issues and market research. Lindstrom combines Fortune 500 corporate security experience with audit and consulting work for Coopers & Lybrand (now PriceWaterhouseCoopers) to offer clients a real-world view to evaluating, selecting and implementing the latest security technologies for enterprises.

    Prior to his corporate and consulting career, Lindstrom held a variety of IT and finance-related assignments in the United States Marine Corps. He has a Bachelor of Business Administration from the University of Notre Dame and is a Certified Information Systems Security Professional (CISSP) and former Certified Information Systems Auditor (CISA).

    This was first published in November 2008

  • Join the conversation Comment

    Share
    Comments

      Results

      Contribute to the conversation

      All fields are required. Comments will appear at the bottom of the article.