‘Phoning Home’ Impact on Enterprise Data, Security and Privacy


Posted on in Presentations

Enterprises seldom know all the ways that vendors send data to their own environments. This lack of awareness can have profound implications. This session will cover four real-world examples of vendors phoning home data without the customer’s authorization or knowledge, the security and regulatory implications of this activity, and the questions you should ask vendors about their data practices.

Pre-Requisites: Understanding of the threat of data exfiltration.

Participants
Matt Cauthorn

Participant

VP of Cybersecurity Engineering, ExtraHop Networks

Jeff Costlow

Participant

CISO, ExtraHop


Share With Your Community