Video: Shadow IT: Regain Control of Your Data
In November 2017 InfoTrust hosted the “Shadow IT – Regain Control of Your Data” Webinar. The online event brought together leading cloud security vendor Symantec and cloud collaboration vendor Dropbox. Collectively, the topic discussed was how to enable business productivity whilst ensuring data stored within the cloud is secure.
The speakers included Mark Shaw, Technology Strategist in the Asia Pacific market for Symantec and Daniel Iversen, Head of Solution Architecture at Dropbox. Mark spoke about his experience within the cloud application security market, how this space is evolving and what Symantec are doing to help organisations protect their most critical asset – their data. Daniel looked at at why the business (aka Shadow IT) are acquiring these applications and what Dropbox is doing to enable organisations to collaborate in the cloud in a secure way.
To access the webinar recording complete the form today.
see our
Related resources
In this 45 minute session, InfoTrust and Mimecast email security experts broke down the different types of prevalent email attacks by their tactics and how these can be mitigated.
We looked at the attack chain for;
- Phishing attacks
- Business Email Compromise and Spear Phishing
- Account Takeover Attacks
- Ransomware Attacks
Giving examples of how each tactic evades your traditional security controls, and why next-generation solutions – specifically Secure Email Gateways, are a necessity for businesses.
In July 2019, InfoTrust partnered with Symantec to host an Overcoming the Challenges of DLP webinar. In this session presenters; Saaim Khan, Security Practice Director of InfoTrust and Sean Callaghan, Senior Systems Engineer at Symantec covered;
InfoTrust and Insentra partnered together in September 2018 to produce a webinar to help answer some of the common questions asked by customers when considering a Data Loss Prevention solution. Together we covered;
1. What problems do DLP and CASB solutions solve?
2. Should your organisation be considering DLP or CASB?
3. What flavour of DLP & CASB do you need?
The first part of this webinar was run by InfoTrust’s Senior GRC Consultant, Saaim Khan, where he shared insights and strategies that have helped InfoTrust clients maximise their DLP technology investments.
For the first webinar in our Combatting Modern Email Attacks Series, we looked at email as a persistent threat vector and critical vulnerability requiring a layered security approach. The InfoTrust team analysed the human factor and how social engineering techniques evade traditional security measures.
To watch the recording of the webinar complete the form today.
In this 48 minute session called “Driving connectivity across your security ecosystem”, InfoTrust shared some of the ways in which we help our customers mature their security strategy, operationalise their security management and realise an optimal return on technology investments.
We were also joined by Neal Krempin, Head of IT at PICA Group, who shared some of the tactics their business has incorporated over the past few years to mature their security strategy.
During the webinar we covered;
- What do good security KPIs look like?
- Assessing your security posture
- What makes a good security roadmap
- Integrating your security platforms
To access the recording today fill in the form below.
We're Here To Help