Webinar - October 27, 2016 at 12:00 PM-1:00 PM EDT
How Do You Know Your Data Loss Prevention System is Working?

Einstein famously defined insanity as "doing the same thing over and over again and expecting different results."

So why do companies continue to follow the same archaic security strategies while data breaches are at an all-time high?

Cyberattacks are a threat to businesses worldwide, and they are getting larger and more sophisticated. Your data assets are constantly under attack!

There has been a 56% increase in data theft in 2015 and 2016. This demonstrates a growing cyber-attack surface with a rise in data exfiltration through threat actors, ransomware, malware, phishing attacks, and other hacks schemes.

The industry’s approach to protecting against these threats must change fundamentally to stay ahead of this growing threat. For too long, the problem has been tackled piecemeal, using isolated devices or services, but protecting against advanced cyberattacks requires communication and coordination among many components – from networking equipment, to specialized appliances, cloud-based services, as well as actionable threat intelligence.

Join us for this special cybersecurity webinar presentation where we'll show you how you can leverage our learning and best practices to fortify your own security infrastructure.

Key takeaways include: 

  • Where your organization's critical data assets are and how to protect them
  • Reliable proven methods to protect against data incidents, ransomware attacks and large data exfiltration data breaches
  • How to best focus your scarce resources on securing the data itself rather than spending ever-higher sums erecting tighter boundaries around it

The logic is sound: despite the billions of dollars spent each year on perimeter and endpoint security, the bad guys keep finding new ways in, and the data breach parade rolls on without a hiccup. Find out how you can best protect your data. 

We expect this webinar to fill up fast!

Guest Speakers

MaryBethBorgwing_Headshot_Square.jpg

Mary Beth Borgwing, President, LemonFish

Mary Beth brings decades of experience as a senior risk, finance, and insurance executive. For 12 years prior to LemonFish, Mary Beth led senior risk teams as an advisor to Fortune 500 clients of Marsh (MMC) and Willis Group Holdings (WSH). Mary Beth is also a frequent speaker at global cyber conferences and contributing author to many national cyber publications.

OndrejKrehel_Headshot_Square.jpg

Ondrej Krehel, Founder & CEO, LIFARS LLC

Ondrej is the former Chief Information Security Officer of Identity Theft 911, the nation’s premier identity theft recovery and data breach management service. His work has received attention from CNN, Reuters, The Wall Street Journal and The New York Times, among many others.

JonNeiditz_Headshot_Square.jpg

Jon Neiditz, Privacy & Data Governance Co-Leader, Kilpatrick Townsend & Stockton LLP

Jon Neiditz co-leads the Cybersecurity, Privacy and Data Governance Practice at knowledge asset protection law firm Kilpatrick Townsend & Stockton LLP. Jon co-chairs the Data Protection Committee of the International Technology Law Association (ITechLaw), is ranked as one of the Best Lawyers in America® in Information Management Law, and has just been listed as the 82nd most influential person in the world in data security.

William Bradley.png

Bill Bradley

Bill Bradley is Director of Product Marketing at Digital Guardian, he brings over 20 years of technology, marketing, and sales experience to the role. He spent the first portion of his career in field sales and maintains this customer centric mentality to his current role in marketing for Digital Guardian. Prior to Digital Guardian Bill was at Rapid7 and the General Electric Corporation.

About LemonFish

LemonFish is a data breach discovery and analytics company whose mission is to identify data that has been exposed, breached, or stolen. Before or after a data breach, we help our customers identify if, where, and when their sensitive data appears on the open web (places commonly indexed), deep web (places not available via the large search engines) and the dark web (places primarily involved in illicit activity.

Save Your Seat!