Countering Insider Threats in eDiscovery

The eDiscovery process by its nature involves collecting and storing volumes of sensitive and valuable data. The data itself may be sensitive, in that intentional or accidental compromise could cause serious damage to your organisation’s interests and reputation. The data also has a high inherent value to your organisation because it is essential to your ability to defend or prosecute a legal matter. When it comes to your data, if it’s valuable, it’s vulnerable.

The eDiscovery process allows many opportunities for unwanted disclosure or loss. To mitigate this risk you need a better understanding of current vulnerabilities and risks that insiders pose, and a strategy to secure data throughout the eDiscovery lifecycle. This requires a holistic approach that combines technical and non-technical methods to deter and detect potential insider threats. Is your organisation prepared?

Brought to You by

Should you download this whitepaper your information will be shared with the sponsor indicated above. See our privacy policy for more information.

What’s Hot on Infosecurity Magazine?