Realign your data protection strategy efforts

Attackers go to great lengths to infiltrate organizations and go well beyond technically savvy hacks to worm through networks and systems to steal identity information and ultimately intellectual property. 

This webcast will break down a modern attack and explain what attackers target and how they execute attacks, all in the context of your need to reassess and re-prioritize risk. You’ll learn what you need to do to realign your data protection strategy efforts to counter new threats by first understanding what’s important to your business, and then developing a strategy that helps you break the chain of events in an attack and stop them before it gets too deep inside your company.

About the expert:
David Sherry is CISO of Brown University.

View All Videos

Security School

Realigning your enterprise's data protection strategies

SECURITY SCHOOL SECTIONS

  1. Articles
  2. Presentations
  3. Audio
  4. Quiz

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close