Data Loss Prevention Group Therapy
Offered By: YouTube
Course Description
Overview
Explore data loss prevention strategies and techniques in this comprehensive conference talk from Louisville InfoSec 2016. Learn about the strengths and weaknesses of DLP tools, how to implement a successful DLP program, and avoid common pitfalls. Discover non-traditional use cases, including employee monitoring and malware hunting. Examine real-world examples, such as the Ashley Madison leak, and learn how to detect cryptomalware ransom notes and string obfuscation methods. Gain insights into building custom malware rules, understanding precise vs. imprecise methods, and implementing DLP countermeasures. Address challenges related to data disorganization, network architecture, and personal vs. professional data. Acquire valuable reference material and management ammunition to enhance your organization's data protection efforts.
Syllabus
Intro
WHAT SHOULD YOU EXPECT?
Loss Prevention
QUICK INTRODUCTION TO DLP
STRENGTHS AND WEAKNESSES
SUCCESSFUL DLP IS A PROGRAM: NOT JUST A TOOL.
MANAGEMENT AMMUNITION
AVOID THE TYPICAL PITFALLS Consequence
PERSONAL EXPERIENCE
NON-TRADITIONAL USE CASES
EMPLOYEE MONITORING USE
CAN YOU USE DLP TO HUNT FOR MALWARE??
REMEMBER THE ASHLEY MADISON LEAK?
FIND CRYPTOMALWARE RANSOM NOTES
FIND STRING OBFUSCATION METHODS
BUILDING YOUR OWN "MALWARE RULES"
PRECISE VS IMPRECISE METHODS
DLP COUNTERMEASURES
DATA DISORGANIZATION & NETWORK ARCHITECTURE
PERSONAL VS PROFESSIONAL
ANY REAL SOLUTIONS
REFERENCE MATERIAL
Related Courses
Introducción al Análisis del Malware en WindowsNational Technological University – Buenos Aires Regional Faculty via Miríadax The Complete Cyber Security Course : End Point Protection!
Udemy Máster en Seguridad Informática. Curso completo de Hacking.
Udemy Network Analysis with Arkime
Pluralsight Configuring Firepower Threat Defense (FTD) Integrations
Pluralsight