Preventing Enterprise Data Theft From Departing Employees

60% Of Job-Changing Employees Admit To Taking Data

What happens when data loss prevention efforts fail? Join this session to discuss the market drivers behind the business need for real time detection and response for a growing inside threat: departing employees.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.

This FREE webinar was recorded on:
October 09, 2019
02:00 PM - 02:30 PM EST

What happens when data loss prevention efforts fail?  Last year, 40 million people changed jobs and 60% of them admitted to taking data when they left. 90% of these inside threats go undetected for months. By the time companies find out about them - the damage is done. 

People quit their jobs everyday and are leaving jobs at a more rapid pace. Source code, product roadmaps and customer lists can't be prevented from leaking our organizations - people are getting too smart. It's time to think about protecting all of the data and detecting and responding to insider threat incidents. 

Join this session to discuss the market drivers behind the business need for real time detection and response for a growing inside threat: departing employees. By attending this webinar, you will learn:

  • Why the departing employee insider threat is more than a security problem; it’s a business problem
  • The difference between protecting data and preventing it
  • The importance of data in the off-boarding process
  • What detection and response on data can do to remediate data loss incidents

We'll discuss how protecting all data can help detect and respond to data loss, leak, misuse and theft since prevention doesn't work.

Presenters:

Rebecca Wynn
CISO
Information Technology

Named 2017 Cyber Security Professional of the Year – Cyber Security Excellence Awards, SC Magazine Chief Privacy Officer 2017 Award, and Global Privacy & Security by Design (GPSbyDesign) – International Council Member – Dr. Rebecca Wynn is a “big picture” thinker who brings nearly 20 years of experience in Information Security, Assurance & Technology. Recently she led the information security, privacy and compliance pre-acquisition, acquisition, and post-acquisition of LearnVest, Inc. to Northwestern Mutual Life Insurance Company – a Fortune 100 company. She is well known for being a gifted polymath, having deep understanding of current cyber security challenges and privacy issues. She has a proven track record of taking companies to the next level of excellence in many sectors including government, financial services, fintech, healthcare, information technology, legal, semiconductors and retail. Always open to new opportunities (https://www.linkedin.com/in/rebeccawynncissp/).

Michelle Killian
Director of Information Security
Code42

Michelle is the Director of Information Security at Code42, and helps the company develop effective security governance and risk management practices. Michelle’s 15+ years of experience as a business leader and master communicator have uniquely positioned her to drive security initiatives that align with business needs and cultivate buy-in from all areas of the organization.

Host:

Jeff Orr
Editor In Chief
Cyber Security Hub

Jeff Orr is a veteran technology strategist, conference producer, and industry analyst passionate about the way people interact with systems and machines through emerging technologies and new user experiences. At Cyber Security Hub, he oversees all editorial direction of its complete portfolio of online products -- as well as engages a network of esteemed industry board members, analysts and key influencers to make CSHub a renowned resource for all things cyber security. Jeff was actively involved in the development and launch of industry-first products, including Wi-Fi and 4G solutions, and leading the wireless strategy for a Fortune 100 entertainment company. His research on emerging technologies includes AI, cyber security, Industrial IoT (IIoT), mobile computing, wearables, and user interfaces.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Sponsored By: