Posted on
in Presentations
Enterprises seldom know all the ways that vendors send data to their own environments. This lack of awareness can have profound implications. This session will cover four real-world examples of vendors phoning home data without the customer’s authorization or knowledge, the security and regulatory implications of this activity, and the questions you should ask vendors about their data practices.
Pre-Requisites: Understanding of the threat of data exfiltration.
Pre-Requisites: Understanding of the threat of data exfiltration.
Security Strategy & Architecture Protecting Data & the Supply Chain Ecosystem Human Element
security awareness security analytics network security governance risk & compliance data security
Topic
Security Strategy & Architecture
Protecting Data & the Supply Chain Ecosystem
Human Element
Subtopic
security awareness
security analytics
network security
governance risk & compliance
data security
Share With Your Community