Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

B.Y.O.E: Bring Your Own Encryption - Prevent a Data Breach and Stay out of the Headlines

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

As device proliferation, data privacy regulations, and enterprise data volumes continue to trend upward, enterprise risks around data compromise continue to be a growing concern. And these breaches are expensive, with fines and penalties for mishandling data privacy steeper than ever, as well as other intrinsic costs like brand damage.

All organizations, regardless of the industry, need to ensure that their systems can protect sensitive information from improper exposure, while also enabling secure communication to their customers, clients and business partners. 

In this webinar we will:

  • Examine some noted recent data breaches and the cost and risk of such data exposure 
  • Hear about the current changing regulator landscape around data breaches
  • Look at the impact of personal and portable devices in data security
  • Learn  best practices for implementing encryption, to protect data without interrupting business

Speakers

Resha Chheda

Resha Chheda Sr. Product Marketing Manager, Proofpoint

    Ken Liao

    Director, Product Marketing, Proofpoint

      John  Pironti

      President, president of IP Architects and risk and security advisor, ISACA

        Stephen Pritchard

        Moderator, Infosecurity Magazine

          Kai Roer

          Senior Partner, The Roer Group

            Brought to You by