Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Data Loss Prevention Group Therapy

via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore data loss prevention strategies and techniques in this comprehensive conference talk from Louisville InfoSec 2016. Learn about the strengths and weaknesses of DLP tools, how to implement a successful DLP program, and avoid common pitfalls. Discover non-traditional use cases, including employee monitoring and malware hunting. Examine real-world examples, such as the Ashley Madison leak, and learn how to detect cryptomalware ransom notes and string obfuscation methods. Gain insights into building custom malware rules, understanding precise vs. imprecise methods, and implementing DLP countermeasures. Address challenges related to data disorganization, network architecture, and personal vs. professional data. Acquire valuable reference material and management ammunition to enhance your organization's data protection efforts.

Syllabus

Intro
WHAT SHOULD YOU EXPECT?
Loss Prevention
QUICK INTRODUCTION TO DLP
STRENGTHS AND WEAKNESSES
SUCCESSFUL DLP IS A PROGRAM: NOT JUST A TOOL.
MANAGEMENT AMMUNITION
AVOID THE TYPICAL PITFALLS Consequence
PERSONAL EXPERIENCE
NON-TRADITIONAL USE CASES
EMPLOYEE MONITORING USE
CAN YOU USE DLP TO HUNT FOR MALWARE??
REMEMBER THE ASHLEY MADISON LEAK?
FIND CRYPTOMALWARE RANSOM NOTES
FIND STRING OBFUSCATION METHODS
BUILDING YOUR OWN "MALWARE RULES"
PRECISE VS IMPRECISE METHODS
DLP COUNTERMEASURES
DATA DISORGANIZATION & NETWORK ARCHITECTURE
PERSONAL VS PROFESSIONAL
ANY REAL SOLUTIONS
REFERENCE MATERIAL

Reviews

Start your review of Data Loss Prevention Group Therapy

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.