Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Data leak prevention - strategy and best practice explained

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

The media frenzy surrounding the Information Commissioner Office's (ICO) newly increased penalties seemingly know no limits, but what about the reality behind the hype?

Join us for a thought-provoking webinar in which we will look at the new penalties, the Data Protection Act and how IT managers can take a practical approach to meeting the needs of the Act without falling foul of breaching ICO rules or, perhaps more importantly, breaking their own IT budgets.

  

This webinar will:

  • Explain the current situation surrounding ICO monitoring

  • Detail the strategy and solutions needed to meet your obligations under the DPA
     
  • Help you understand the need for security best practice in the IT department

  • Look at how the carrot can be better than the stick when it comes to implementing an effective data leak prevention strategy

 

 

This webinar is aimed at:

  • IT managers wanting an appraisal of real-world DPA/ICO strategy

  • Business managers who are concerned about the new ICO penalties

  • Anyone wanting to better understand how to better protect their organisation's data


    CISSP SSCP logo

    CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

 

Speakers

Ben Chai

Ben Chai Analyst, Incoming Thought

    Steve Gold

    Steve Gold, Infosecurity Magazine

      Derek Middlemiss

      Derek Middlemiss Security Engineer, Check Point Software Technologies