Data leak prevention - strategy and best practice explained

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The media frenzy surrounding the Information Commissioner Office's (ICO) newly increased penalties seemingly know no limits, but what about the reality behind the hype?

Join us for a thought-provoking webinar in which we will look at the new penalties, the Data Protection Act and how IT managers can take a practical approach to meeting the needs of the Act without falling foul of breaching ICO rules or, perhaps more importantly, breaking their own IT budgets.


This webinar will:

  • Explain the current situation surrounding ICO monitoring

  • Detail the strategy and solutions needed to meet your obligations under the DPA
  • Help you understand the need for security best practice in the IT department

  • Look at how the carrot can be better than the stick when it comes to implementing an effective data leak prevention strategy



This webinar is aimed at:

  • IT managers wanting an appraisal of real-world DPA/ICO strategy

  • Business managers who are concerned about the new ICO penalties

  • Anyone wanting to better understand how to better protect their organisation's data

    CISSP SSCP logo

    CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.



Ben Chai

Ben Chai Analyst, Incoming Thought

    Steve Gold

    Steve Gold, Infosecurity Magazine

      Derek Middlemiss

      Derek Middlemiss Security Engineer, Check Point Software Technologies