Description: DLP systems are becoming more and more prevalent in medium to large enterprises. While these systems can be very effective at preventing data leakage, the operational complexity often limits the full capability of the technology. This talk examines some of the core technologies (not products), operational limitations, and proposes a systematic methodology to test end to end effectiveness of an implementation. Additionally techniques will be discussed that have been used in actual penetration tests to bypass highly restrictive DLP implementation and their components.
Latest from the SecurityTube Blog:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Original Source: http://www.youtube.com/watch?v=497hZJqv_ck