WEBINAR SERIES
Secure your data:
data loss prevention for organisations
More than 50% of organisations say they experienced business disruption and revenue loss due to data loss incidents.* But, what exactly is data loss in 2025? Why should you be concerned with this growing problem? How can it be solved?
In today’s digital world people use a variety of tools to communicate and collaborate. However, with this widespread use comes significant risk. This includes the careless or malicious sending of sensitive data to unauthorised accounts. Just one of these data loss events can have devastating consequences.
Join Proofpoint’s Dave Barnett, Director of Advanced Technology, as he explores in 30-minute sessions the fundamentals of Data Loss Prevention (DLP). Discover how you can protect your organisation’s sensitive data in today’s data loss landscape.
Why you should attend:
- Expert knowledge sharing - learn from seasoned cybersecurity professionals with extensive experience in data protection.
- Actionable insights - acquire practical tips and techniques to implement DLP measures in your organisation.
- Interactive sessions - engage in live Q&A with our panel to address your specific concerns and questions.
Register once and you will automatically be enroled in all three sessions. If you cannot attend live, you will receive a copy of the replay after the live broadcast.
* Source – Proofpoint 2024 Data Loss Landscape report.
Take the first step towards mastering Data Loss Prevention.
Register at the top of the page.
Webinar series
Watch On Demand | Introduction to Data Loss Prevention (DLP) |
Tuesday 6th May 2025 | Preventing data loss from careless users |
Tuesday 20th May 2025 | Preventing data loss from malicious users |
Tuesday 3rd June 2025 | Preventing data loss from compromised users |
Introduction to DLP
ON DEMANDWhat is data loss? Gain a clear understanding of the different types of data loss.
Why does the problem exist in organisations? We identify the common causes and vulnerabilities that lead to data loss.
Why is it important? Learn about the financial cost of insider threats and the effect it can have on your organisation's reputation and integrity.
What are the solutions? Connect the dots between content, behaviour and threats. Get an introduction to effective solutions and strategies, setting the stage for our upcoming webinars.
With guest speaker Carl Leonard, EMEA Cybersecurity Strategist.
Preventing data loss from careless users
13:00 BST / 14:00 CET / 17:00 GST, Tue 6th May 2025What is Accidental Data Exposure? Understand common scenarios of accidental data exposure with real-world examples.
What are the common causes? Discover how human error and technical glitches contribute to the issue.
What impact does Accidental Data Exposure have? Organisational and personal consequences.
What are the solutions? We explore employee training and awareness programs, data handling procedures, encryption, access controls, and other security technologies.
With guest speaker Raj Tawni, Program Strategy Advisor.
Preventing data loss from malicious users
13:00 BST / 14:00 CET / 17:00 GST, Tue 20th May 2025What can go wrong with people? Understand the more common circumstances that people find themselves in that leads to them stealing data.
How bad is the risk? Discover how malicious employees can damage your business.
How can you solve it? How do you look for malicious behaviour in your workforce.
What pitfalls to avoid? No one likes to be monitored unnecessarily and in some countries there are laws to prevent excessive oversight on employees. What's the right balance?
With guest speaker Kasey Olbrych, Enterprise Security Architect.
Preventing data loss from compromised users
13:00 BST / 14:00 CET / 17:00 GST, Tue 3rd June 2025Who exactly is your adversary? Let’s talk about the rogues' gallery and the common tactics they use.
How does a user become compromised? Understand the ways in which employee credentials are stolen.
What options do you have to prevent this from happening? Learn the practical options to stop credential theft.
What happens if they are in your organisation already? What detection mechanisms are there? How do you stop it and how do you clean up afterwards?
What does ‘good’ look like? If you had a magic wand, what would your resilient data security posture look like?
With guest speaker Josh Linkenhoker, Lead Staff Sales Engineer.