Visual Privacy: Is it the Weak Link in Your Data Security Strategy?

Visual Privacy: Is it the Weak Link in Your Data Security Strategy?
Visual Privacy: Is it the Weak Link in Your Data Security Strategy?

Visual Privacy: Is it the Weak Link in Your Data Security Strategy?

Click here to register for free!

Date: Thursday, Mar. 3rd 2011
Time: 2:00 p.m. ET/11:00 a.m. PT

Thursday, Mar. 3 2011 2:00 p.m. ET/11:00 a.m. PT

Did you know two-thirds of working professionals expose sensitive corporate data outside the workplace – some even exposing highly regulated and confidential information like customer credit card and social security numbers?

Visual Privacy – the protection of sensitive information as it is displayed on screen – is an emerging issue in information security and an under-addressed area of risk in corporate security policies. Given the rapid digitization of sensitive information and the growing mobility of workers today, the need to protect displayed information has grown substantially.  

Dr. Hugh Thompson, Chief Security Strategist of People Security and author of the new Visual Data Breach Risk Assessment Study, reveals key findings from the study and discusses the risk and impact of a visual data breach due to careless employees and a lack of policy and controls.

In this webcast Dr. Hugh Thompson will address the following:

·         Is visual privacy important and is corporate information actually ever put at risk?

·         Why is it important to address visual privacy in your corporate date security strategy? 

·         How can you effectively educate your employees to ensure that your company data is properly protected at all times -- while it is stored, transmitted and viewed?  

Featured Speakers

Dr. Herbert H. Thompson, chief security strategist, People Security

Click here to register for free!

Sponsored by:

Sign up to our newsletters

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...