Data leak prevention - strategy and best practice explained

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The media frenzy surrounding the Information Commissioner Office's (ICO) newly increased penalties seemingly know no limits, but what about the reality behind the hype?

Join us for a thought-provoking webinar in which we will look at the new penalties, the Data Protection Act and how IT managers can take a practical approach to meeting the needs of the Act without falling foul of breaching ICO rules or, perhaps more importantly, breaking their own IT budgets.


This webinar will:

  • Explain the current situation surrounding ICO monitoring

  • Detail the strategy and solutions needed to meet your obligations under the DPA
  • Help you understand the need for security best practice in the IT department

  • Look at how the carrot can be better than the stick when it comes to implementing an effective data leak prevention strategy



This webinar is aimed at:

  • IT managers wanting an appraisal of real-world DPA/ICO strategy

  • Business managers who are concerned about the new ICO penalties

  • Anyone wanting to better understand how to better protect their organisation's data

    CISSP SSCP logo

    CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.



Ben Chai

Analyst, Incoming Thought

Steve Gold

Infosecurity Magazine

Derek Middlemiss

Security Engineer, Check Point Software Technologies

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.