Mobility as a trend has long captivated the business world. It did not pass workplaces, neither devices nor working hours. The idea of having access to company resources anytime and from anywhere contributes to the business process throughout and is simply comfortable for the staff. However, at the same time it brings up a variety of challenges for the IT-department.
-How to protect information when employees need it, day and night anywhere in the world?
-How to meet the security policy requirements at the same time?
-How to choose the right solution for your requirements and spend fewer resources?
In her presentation, Natalia Klaus will acquaint you with all kinds of mobile work scenarios and offer options for solutions to different tasks concerning IT specialists.
It is believed that the functionality of DLP (Data Leakage Prevention) system is limited only by catching the facts of important information leakage. However, modern DLP system in the course of its work, accumulates a significant amount of digital communications. And if we apply to these data the analysis tools available today, the DLP system can be of a great help solving the problems of personnel security in organizations.
During the presentation we will be describing the best practice methods of using DLP systems to meet the challenges of personnel staff profiling, groups of risk identification, as well as the circumstances that contribute to the thefts. There will be given the list of so-called "Signal flags" and examples of real-life ways to identify several groups of risk.
When advanced attackers compromise a network, they relentlessly advance towards a clearly defined target. To reach their goal, these persistent, highly skilled attackers repeatedly collect data, analyze it, and use it to move laterally. Deception technology is the most effective way to detect advanced attackers early as it uses their own persistence and iterative tactics against them. Using fake information such as user-credentials, servers, and websites, you can detect attackers before they reach sensitive data. To remain one step ahead, state-of-the-art, network-optimized deceptions automatically and dynamically construct a deceptive layer over your entire network, with zero IT footprint and no agents installed. By constantly creating an environment where attackers cannot tell real information from fake information, deceptions ensure that the data attackers collect is always unreliable. And if attackers cannot rely on collected data, they cannot proceed and the attack is neutralized.
This year we will be witnesses of qualitative changes in approaches for providing protection. Cause of this change is a switch in cyber warfare battlefields. We see forming of several domains where adequate security techniques are still absent and these domains are the ones where cybercriminals will target. Talk will outline new security frontiers and possible approaches for providing protection will be listed.