Logo

This webinar was originally broadcast on:
Tuesday, October 28, 2014 01:00 PM EDT / 10:00 AM PDT
 
If you have previously registered for this event, please login here:
 Email
 LOGIN

Registration is required to attend this event. Please register now.
First Name*
Last Name*
Title*
Industry*
Company Size*
Company*
Street Address 1*
Street Address 2
City*
State/Province*
Zip*
Country*
Phone*
Email*
NEW!... Early Registration!
 Check here if you would like to automatically be registered for webinars on the same topic
You must have Javascript and Cookies enabled to access this webcast. Click here for Help.
 
Please enable Cookies in your browser before registering for the webcast.
 
*Denotes required.
 
REGISTER
2014 has been called “The Year of Encryption.” Recent data breaches, personal identity theft cases, and email snooping concerns have put a spotlight on the importance of protecting sensitive data, both inside and outside the enterprise.

Email is invaluable to enterprises and it’s critical to end users who employ it more than the telephone, instant messaging and social media combined. Email is the easiest mode of communication and file transfer, which also makes it an easy target for data theft.

As email users communicate sensitive data, often in the form of credit card numbers, social security numbers, phone numbers, personal financial data, and personal health information, it is sent and resent to multiple users and locations. Sometimes this data is secure, but all too often, it is not. This impacts companies of all sizes where email security vulnerabilities are both internal and external to the enterprise.

The need to protect private information being communicated by email between colleagues, customers, prospects, patients, loan applicants, and clients – and while at rest inside mailboxes – is now the norm. Unfortunately, many enterprise email solutions are several years old and use outdated and ineffective security technology.

Join us for this session in which we will explore the key concepts and best practices to protect and maintain private email communications and why you need to rethink your email security – before your company is the next victim to suffer from a data breach. Hear from two email security experts -- Michael Osterman of Osterman Research, and Stacia Topping of Voltage Security -- and learn:

  • Best practices for securing sensitive email communications.
  • When it’s the right time to replace your legacy email security.
  • How to protect sensitive email information as it flows to and from the enterprise.
  • Latest insights on Identity-Based Encryption and Stateless Key Management.
  • How other enterprises deploy the world’s most popular email security solution.
  • How end-to-end Identity-Based Encryption (IBE) helps protect email in the event of a vulnerability being exploited.

Presenters

Stacia Topping
Product Manager
Voltage Security



Michael Osterman
Principal
Osterman Research




Moderator

Erik K. Linask
Group Editorial Director
TMCnet