Secure Collaboration for the Enterprise - sponsored by Axway & HP

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Businesses rely on the effective sharing of important information; internally and externally with customers and suppliers, transferring over 80% of business information in files.

As organisations increasingly rely on mobile working and cloud-based services in addition to the global requirements of business - the risks of interception, breaches and data loss are rising. How can you ensure that data is moved, managed and shared securely? 

During this webinar, the panel will provide you with insight into how to ensure secure data sharing within your organisation and with third parties. You will: understand how sensitive data is being shared by organisations Identify appropriate processes, controls and technology to enable employees to share data securely and discover how to utilise encryption to secure data for transfer.


Photo of Dave Brunswick

Dave Brunswick

Head of Technology Strategy, Axway

Photo of Andrew Kellett

Andrew Kellett

Senior Analyst, Ovum

Sean Rainey

Security Partner Business Development Manager, Tec

Jason Walton

Security Operations Manager, Virgin Media

Photo of Victoria Windsor

Victoria Windsor

Moderator, Infosecurity Magazine

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.