Posted on
in Presentations
Personnel departures are common, not just from layoffs and terminations, but also resignations, reorganizations and spin-offs. How do you deal with these from a security standpoint? How do you extinguish access, protect against data theft and manage the data left behind? This session will discuss risks and best practices for managing off-boarding effectively, decreasing threats and vulnerabilities.
Security Strategy & Architecture
forensics & e-discovery insider threats policy management risk & vulnerability assessment access control
Topic
Security Strategy & Architecture
Subtopic
forensics & e-discovery
insider threats
policy management
risk & vulnerability assessment
access control
Share With Your Community