On-demand Webcast:
Top 5 Myths to Protecting Your Data, and What To Do About It
Hosted by: SC Magazine
Customer data. Corporate financials. HR records. Strategic M&A plans. These are all part of the ecosystem of data that you have to protect. How effective are your current processes in delivering this protection? If traditional security technologies actually delivered the promised level of protection, why is there a constant stream of companies still getting breached, losing their customer data, and failing audits?
There is a set of beliefs, myths actually, on implementing an information security program which actually leaves companies further exposed and increases their risk. These not only impact how effective a security program can be, but also impact a company's ability to access and manage this data to make better decisions, and serve their customers more effectively.
Join us for this webinar to understand these myths, and how you can dispel them to deliver a much stronger level of protection, and increase your agility and performance.
Featured Speaker
|
|
|
Senior Director, Marketing, Voltage Security |
Dave Anderson currently serves as the Senior Director, Marketing for Voltage Security, where he is responsible for developing market strategy, delivering new technology solutions to market, and managing global campaigns and programs for Voltage's data protection and encryption solutions. Prior to Voltage, Dave led marketing and program strategy for McAfee, SAP, and VeriSign.
Dave has 20 years of experience within business strategy, marketing, and product development at leading technology and services firms, including SAP, ArcSight/HP, KPMG, and VeriSign, and has worked extensively across Asia and Europe in delivering market and industry security solutions. His expertise focuses on strategy and planning, marketing, and operational governance.
Dave received his MBA from Duke University, the Fuqua School of Business in 2010. He has been published in multiple industry and technical journals, and is a frequent speaker on risk management, corporate governance, security, and strategy. |
|
|
|
|
| |
|