Completed
SUCCESSFUL DLP IS A PROGRAM: NOT JUST A TOOL.
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Data Loss Prevention Group Therapy
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 WHAT SHOULD YOU EXPECT?
- 3 Loss Prevention
- 4 QUICK INTRODUCTION TO DLP
- 5 STRENGTHS AND WEAKNESSES
- 6 SUCCESSFUL DLP IS A PROGRAM: NOT JUST A TOOL.
- 7 MANAGEMENT AMMUNITION
- 8 AVOID THE TYPICAL PITFALLS Consequence
- 9 PERSONAL EXPERIENCE
- 10 NON-TRADITIONAL USE CASES
- 11 EMPLOYEE MONITORING USE
- 12 CAN YOU USE DLP TO HUNT FOR MALWARE??
- 13 REMEMBER THE ASHLEY MADISON LEAK?
- 14 FIND CRYPTOMALWARE RANSOM NOTES
- 15 FIND STRING OBFUSCATION METHODS
- 16 BUILDING YOUR OWN "MALWARE RULES"
- 17 PRECISE VS IMPRECISE METHODS
- 18 DLP COUNTERMEASURES
- 19 DATA DISORGANIZATION & NETWORK ARCHITECTURE
- 20 PERSONAL VS PROFESSIONAL
- 21 ANY REAL SOLUTIONS
- 22 REFERENCE MATERIAL