Join Mike Chapple for an in-depth discussion in this video Data loss prevention, part of CISM Cert Prep: 4 Information Security Incident Management.
- [Instructor] Organizations handle many different…types of sensitive information on a regular basis.…This includes trade secrets, proprietary business plans,…health records and the personal identifying information…or PII of employees and customers.…Unwanted disclosures of sensitive information,…could lead to very serious security incidents…that expose an organization to fines, sanctions,…and reputational damage.…Data Loss Prevention or DLP solutions provide technology…that helps an organization enforce…its information handling policies…and procedures in order to prevent data loss and theft.…
DLP solutions search systems for stores…of sensitive information that might be unsecured…and they also monitor network traffic for potential attempts…to remove sensitive information from the organization.…DLP solutions can act quickly to block transmissions before…damage is done, and alert administrators…to attempted security breaches.…DLP systems work in two different environments,…host-based DLP uses software agents installed…
Author
Released
11/27/2018- Creating an incident response team
- Classifying incidents
- Building an incident response program
- Identifying symptoms of incidents
- Conducting forensic investigations
- Logging and monitoring
Skill Level Intermediate
Duration
Views
Related Courses
-
CISM Cert Prep: 1 Information Security Governance
with Mike Chapple1h 50m Intermediate -
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Appropriate for all -
IT Security Careers and Certifications: First Steps
with Marc Menninger2h 6m Appropriate for all
-
Introduction
-
Study resources1m 24s
-
1. Incident Response
-
2. Assessing Incidents
-
Threat classification4m 5s
-
3. Incident Response Process
-
Incident communications plan2m 51s
-
Incident identification4m 2s
-
Escalation and notification2m 42s
-
Mitigation2m 46s
-
Containment techniques3m 21s
-
Validation2m 20s
-
4. Incident Symptoms
-
Network symptoms4m 2s
-
Endpoint symptoms2m 55s
-
Application symptoms2m 20s
-
-
5. Forensic Investigations
-
Evidence types3m 51s
-
System and file forensics4m 17s
-
Creating forensic images5m 36s
-
Digital forensics toolkit2m 44s
-
Password forensics8m 9s
-
Network forensics4m 19s
-
Software forensics2m 52s
-
Mobile device forensics1m 14s
-
Embedded device forensics2m 50s
-
Chain of custody2m 13s
-
6. Logging and Monitoring
-
Data loss prevention6m 34s
-
Conclusion
-
Next steps1m 16s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Data loss prevention