Fact or fiction: Building and enforcing DLP policies

Deploying a data loss prevention (DLP) solution is just the first step in the process of controlling the sensitive data flowing through your company's network. But DLP solutions need robust policies and procedures to increase their effectiveness. This expert podcast gives advice for developing comprehensive DLP policies for locking down the most valuable information on your organization's network, as well as strategies and tactics for enforcing those policies with users.

This Content Component encountered an error

SearchSecurity.com Security School
 

This podcast is a portion of SearchSecurity.com's Data Protection Security School lesson, Data loss prevention. Visit the lesson and school pages for additional learning resources, or visit our Security School Course Catalog to begin other lessons.


Deploying a data loss prevention (DLP) solution is just the first step in the process of controlling the sensitive data flowing through your company's network. But DLP solutions need robust policies and procedures to increase their effectiveness.

This expert podcast gives advice for developing comprehensive DLP policies for locking down the most valuable information on your organization's network, as well as strategies and tactics for enforcing those policies with users.

Play now:

You must have Adobe Flash Player 7 or above to view this content.See http://www.adobe.com/products/flashplayer to download now.
Download for later:

Fact or fiction: Building and enforcing DLP policies
• Internet Explorer: Right Click > Save Target As
• Firefox: Right Click > Save Link As

About the speaker:
Rich Mogull is the founder of research and consulting firm Securosis.

This was first published in February 2008

Dig deeper on Data Loss Prevention

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close