Whether they admit it or not, almost all companies still utilize ancient (read: unsecure) methods to exchange supposedly highly confidential documents and other intellectual property. Despite the best efforts of IT originations and legal departments to outlaw the use of email and other casual means of distributing confidential documents, users find a way to work around these policies. It is common knowledge for example that these outlaw users can simply rename a .ZIP file to a .PIZ file to bypass most email restrictions, or use a personal free app to “drop” a file into a secure “box”. What trends are occurring in the areas of data exchange? Is IP protection getting better or worse? In many cases it seems that IT has just given up and end users can do whatever they want.
This presentation explores the ways that information leaks out of your enterprise. Real world customer solutions will be presented as use cases.
Bring your tough questions.