CISO Workshop Module 5: Information Protection
Learn how to protect sensitive information wherever it goes with automatic classification and persistent encryption across devices. Includes information on continuous monitoring of data across mobile devices, cloud services, and other corporate assets.
- Download PDF summary: Module 5: Information Protection
- Download PowerPoint summary: Module 5: Information Protection
Introduction: Information Protection (3:04)
Part 1: Information Protection History and Context (8:43)
Part 2: Information Protection Strategy (9:11)
Part 3: Story of a File and Protecting Information Anywhere (10:23)
Feedback
Submit and view feedback for