Data Security: From Creation to Sharing

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

All organizations need to ensure their employees have quick and easy access to data so they can be as productive as possible. Sadly, this approach often increases the risk of data breaches occurring, particularly among hybrid workforces operating outside of corporate buildings.

In this environment, the traditional focus on infrastructure control is no longer sufficient to protect organizations’ data. Instead, steps must be taken to protect data throughout its entire lifecycle, from the point that it is created, to various ways it is shared, going beyond our control into the hands of a business partner, shareholder or customer.

In this webinar, a panel of experts will highlight the key mechanisms organizations need to introduce to protect their data at all stages, thereby developing a best-in-class policy that their customers can have confidence in.

Attendees will learn:

  • The common ways data breaches occur, especially since the start of COVID-19         
  • The inadequacies of traditional approaches to data protection
  • The key technologies and processes required to secure data across its entire lifecycle

Speakers

Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Nick Hogg

Nick Hogg

Director of Technical Training, Fortra

Photo of Paul  Holland

Paul Holland

Principle Research Analyst, Information Security Forum

Photo of Zoe Rose

Zoe Rose

Regional and Supplier Information Security Lead, Canon Europe

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Fortra here: https://www.fortra.com/privacy-policy. Please see Infosecurity Magazine’s privacy policy for more information.