Training

Fraud Management & Cybercrime , Fraud Risk Management

Risk Assessments: Protecting Your Organization from the Next Major Breach

Risk Assessments: Protecting Your Organization from the Next Major Breach
Organizations were embarrassed by the WikiLeaks episode that resulted in the unauthorized release of more than 250,000 sensitive and classified government and financial documents. This leak - and the threat of others in both the public and private sectors - forces information security leaders to ask: What more can we do to protect access, portability and privacy of critical data?

Join an expert panel for a discussion on:

  • Risk assessments, corrective actions and incident response essentials for WikiLeaks-type breaches;
  • Strategies to control users' access to private information;
  • Tools and techniques for preventing data loss.

See Also: Live Webinar | Embracing Digital Risk Protection: Take Your Threat Intelligence to the Next Level

Background

Late in 2010, the group known as WikiLeaks released thousands of sensitive government documents obtained by insiders who had too much access to critical data. Around the same time, the group threatened to release even more documents that potentially could embarrass public and private sector entities, including Bank of America.

These incidents raised new questions about security, privacy, ethics and especially access - who are the people who really should have access to your organization's most sensitive data?

Organizations today are more sensitive to the insider threat that could result in WikiLeaks-like revelations. But are they putting in place the correct systems and processes to ensure greater security and privacy?

In this session, you'll hear from a U.S. government CISO, a noted security expert and one of the industry's top security solutions providers, as they discuss:

  • The data exposure risks to organizations of all types;
  • Lessons learned from WikiLeaks;
  • Systems and processes that can help ensure greater security against the new insider threat.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.