Overview
Syllabus
Intro
WHAT SHOULD YOU EXPECT?
Loss Prevention
QUICK INTRODUCTION TO DLP
STRENGTHS AND WEAKNESSES
SUCCESSFUL DLP IS A PROGRAM: NOT JUST A TOOL.
MANAGEMENT AMMUNITION
AVOID THE TYPICAL PITFALLS Consequence
PERSONAL EXPERIENCE
NON-TRADITIONAL USE CASES
EMPLOYEE MONITORING USE
CAN YOU USE DLP TO HUNT FOR MALWARE??
REMEMBER THE ASHLEY MADISON LEAK?
FIND CRYPTOMALWARE RANSOM NOTES
FIND STRING OBFUSCATION METHODS
BUILDING YOUR OWN "MALWARE RULES"
PRECISE VS IMPRECISE METHODS
DLP COUNTERMEASURES
DATA DISORGANIZATION & NETWORK ARCHITECTURE
PERSONAL VS PROFESSIONAL
ANY REAL SOLUTIONS
REFERENCE MATERIAL