Data Leaks
- Threats targeting databases
- Finding data in the organization network
- Understanding the value of data
- Risk analyses related to data losses
Data Leaking from Clients and Servers
- Leaking data with USB and portable devices
- Data leakage over the network
- Physical data leakage
- Other data leakage methods
Data Infiltration from Applications
- Data leakage through web applications
- Ensuring application security against data leakage
- Access and authorization controls
- Backup and archiving
Measures against Data Infiltrations
- Technological measures against data leakage
- Establishment of policies and processes
- Long-term measures
- What to do in case of data leakage