Information Security Leader, Author, Instructor and Speaker

Podcast: Countdown: Top Five Ways to Detect Unwanted Data in the Enterprise

Posted on February 14, 2012 in Presentations | by

Our file servers, workstations, flash drives and cloud services all contain massive amounts of data, driven by the fact that storage has quickly become an inexpensive commodity. It’s often cheaper to just keep everything than to expend time and energy sorting through outdated, irrelevant or inapplicable data. However, this practice can dramatically increase risk to the enterprise by increasing the amount of data vulnerable to an attack. In this podcast, we look at five ways that you can detect the presence of unwanted data in your environment.

Listen to the Podcast: Countdown: Top Five Ways to Detect Unwanted Data in the Enterprise

Published February 14, 2012 on Bitpipe.com

TAGS:

Leave a Reply

Your email address will not be published. Required fields are marked *

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple