Information Security Research Library

Powered by


A data breach can occur as a result of any number of incidents, from a targeted attack to a missing mobile endpoint to a misconfigured network security device. What should an organization fear most: the worst-case breach scenario, or just the most likely one? In this video, you'll learn how to take a realistic, pragmatic look in the mirror to see where your organization's assets are, why breaches happen and how to use limited resources to mount the best possible strategic data breach prevention effort. Specific points of emphasis will include:

  • What common methods have proven successful for attackers time and again
  • Why so many organizations ultimately breach themselves
  • How to gauge an organization's risk posture based on key risk factors
  • What key technologies, policies and processes are essential to preventing breaches


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.