Case Studies: Cyber Security Protects Sensitive Data

Add bookmark

One of the most impactful ways cyber security professionals can learn from one another is through real-world use cases; understanding how the implementation of practictal procedures and protocols is more than just a process, rather a full-on defense mechanism against human error and malicious intent.

In this report, cyber security professionals will find two case studies, each outlining the ways in which those tasked with securing their enterprise's personnel and sensitive data are taking the steps to do so.

Download this report and find out how the San Francisco District Attorney's Office and Henry M. Jackson Foundation are putting tools in place to avoid hacks and breaches in their enterprises.

Upcoming Events

Automotive Cyber Security, Connectivity & SDV Week 2025

18th - 20th November, 2025

Van der Valk Hotel Berlin Brandenburg, Germany

Automotive Cyber Security, Connectivity & SDV Week 2025

Digital Identity Week

1st - 2nd September 2026

Sydney, Australia

Digital Identity Week

Latest Webinars

From Dependencies to Defences: Navigating Software Supply Chain Security

2025-09-24

11:00 AM - 12:00 PM SGT

Learn how to defend your software supply chain from dependency threats and build resilient security...

Unpacking global regulatory frameworks to enhance third-party operational resilience

2024-11-14

11:00 AM - 12:00 PM EST

Join this webinar to explore the resilience-focused requirements of DORA, NIS2 and other global regu...

Preventing financial and reputational risk with process intelligence

2024-05-23

11:00 AM - 12:00 PM EDT

Learn how to manage risk stemming from poorly controlled processes in a collaborative way

Recommended