Главная
Study mode:
on
1
Intro
2
WHAT SHOULD YOU EXPECT?
3
Loss Prevention
4
QUICK INTRODUCTION TO DLP
5
STRENGTHS AND WEAKNESSES
6
SUCCESSFUL DLP IS A PROGRAM: NOT JUST A TOOL.
7
MANAGEMENT AMMUNITION
8
AVOID THE TYPICAL PITFALLS Consequence
9
PERSONAL EXPERIENCE
10
NON-TRADITIONAL USE CASES
11
EMPLOYEE MONITORING USE
12
CAN YOU USE DLP TO HUNT FOR MALWARE??
13
REMEMBER THE ASHLEY MADISON LEAK?
14
FIND CRYPTOMALWARE RANSOM NOTES
15
FIND STRING OBFUSCATION METHODS
16
BUILDING YOUR OWN "MALWARE RULES"
17
PRECISE VS IMPRECISE METHODS
18
DLP COUNTERMEASURES
19
DATA DISORGANIZATION & NETWORK ARCHITECTURE
20
PERSONAL VS PROFESSIONAL
21
ANY REAL SOLUTIONS
22
REFERENCE MATERIAL
Description:
Explore data loss prevention strategies and techniques in this comprehensive conference talk from Louisville InfoSec 2016. Learn about the strengths and weaknesses of DLP tools, how to implement a successful DLP program, and avoid common pitfalls. Discover non-traditional use cases, including employee monitoring and malware hunting. Examine real-world examples, such as the Ashley Madison leak, and learn how to detect cryptomalware ransom notes and string obfuscation methods. Gain insights into building custom malware rules, understanding precise vs. imprecise methods, and implementing DLP countermeasures. Address challenges related to data disorganization, network architecture, and personal vs. professional data. Acquire valuable reference material and management ammunition to enhance your organization's data protection efforts.

Data Loss Prevention Group Therapy

Add to list
0:00 / 0:00