Cyber150 Agenda

Data Security

DATE
TIME
TOPIC
TBD
TBD

Data breaches: You've been compromised, they may have exfiltrated data, now what?

TBD
TBD

Mobile protection: Securing your data when it's in the hands of your users and moving around

TBD
TBD

Is DLP dead? How will we protect data in the future?

TBD
TBD

Data labeling and classification: What are the elements of a successful program?

TBD
TBD

Social Engineering and Your Data: Evolving Sophistication Requires Vigilance

TBD
TBD

Removeable Media and Data Exfiltration

TBD
TBD

Data Encryption: When, Where, and How?

TBD
TBD

Backup and recovery: Are we doing enough to ensure that we can quickly recover from a significant event?

TBD
TBD

Logging for applications: What should we be capturing and how much is too much?

TBD
TBD

Physical data security: The often overlooked aspect of securing data

TBD
TBD

Data leaks in mobile apps: Are you checking for them and dealing with discovered issues?

TBD
TBD

Secure passwords: Proper complexity and enforcing change intervals are key to keeping your data safe

TBD
TBD

Data breaches: You've been compromised, they may have exfiltrated data, now what?

TBD
TBD

Logging for applications: What should we be capturing and how much is too much?