Featured
The Great Remote Work Data Heist: How to Keep Your Info Secure
Dan Feller, Principal Technical Marketing Manager, Lookout
In the wild frontier of remote work, your data is the prized loot everyone’s after. As the digital outlaws get bolder, ensuring your information stays locked up and safe is more crucial than ever. Saddle up and join us for a showdown on how to protect your virtual gold from the bandits of the information age!
In this high-stakes webinar, you’ll learn how to:
- Clientless Access: Discover how to control access to your SaaS and private apps without the need for client-side installations, keeping the outlaws from sneaking in through the back door.
- Device Posture Checks: Learn how to assess and enforce device security standards, ensuring only the most secure contraptions get access to your stash.
- Data Protection: Master the art of masking, encrypting, and decrypting sensitive data, so even if someone manages to make off with them, the loot remains locked in your treasure chest.
Gear up to defend your digital frontier and keep your data from falling into the wrong hands. This webinar is your chance to outwit the modern-day desperadoes and keep your remote work secure. Don’t let the outlaws run off with your digital gold—join us and secure your digital ranch!
All episodes
-
Mastering SSE | Protect Your Data From the GenAI Overlords
Daniel Feller, Principal Technical Marketing Manager, Lookout
In an era where Generative AI (GenAI) is taking over our business operations like an overzealous ruler, ensuring your data is protected is more crucial than ever. Join us to discover the essential strategies for keeping your data safe from the increasingly ambitious plans of our GenAI overlords!
In this session, you will:
- Learn how to effectively audit and monitor GenAI interactions to identify potential risks and ensure compliance with data protection regulations.
- Explore methods to prevent unauthorized access to GenAI platforms, ensuring that only vetted and approved tools are used within your organization.
- Implement robust DLP strategies to prevent sensitive information from being inadvertently shared or exposed through GenAI interfaces.Get the knowledge and tools needed to navigate the complexities of data protection in the age of GenAI. Don’t miss this opportunity to fortify your organization’s data security posture and stay ahead of emerging threats.
Topics:
- Audit: How many users are using GenAI tools
- Block GenAI
- Block GenAI/Exception for ChatGPT
- Allow GenAI/Restrict PII -
Mastering SSE | ZTNA: So Easy, It Feels Like Cheating
Daniel Feller, Principal Technical Marketing Manager, Lookout
Implementing Zero Trust Network Access (ZTNA) can sometimes feel like solving a Rubik’s Cube blindfolded. But what if you had cheat codes to make it all easier? This webinar is here to show you how to implement ZTNA with the simplicity of a game hack.
In this session, you will:
- Discover how to effortlessly deploy ZTNA using an integrated, step-by-step workflow that makes setting up your solution feel like a walk in the park.
- Learn how to seamlessly identify and secure the private resources your users need access to, without breaking a sweat.
- Get the lowdown on creating and implementing adaptive access policies that adjust to your users' needs and behaviors, all while keeping security tight.If you want to streamline your ZTNA setup and make deployment so simple it feels like you’ve unlocked the ultimate cheat code, this webinar will arm you with everything you need to win the game.
Topics:
- Walk through VPN Deployment workflow -
Mastering SSE | Cloud Leaks: Plugging The Holes Before Your Data Goes Rogue
Daniel Feller, Principal Technical Marketing Manager, Lookout
In a digital landscape where cloud storage leaks are as common as a forgotten password, safeguarding your data is more important than ever. If you're tired of your files slipping through the cracks and making unplanned escapes, this webinar is here to help you seal those gaps with confidence!
In this session, you will learn how to:
- Restrict Public File Sharing: Learn the art of keeping your files from accidentally moonlighting on the internet, and discover best practices to manage public sharing without compromising security.
- Safeguard Sharing with External Users: Uncover the secrets to securely sharing files with external partners, vendors, or collaborators.
- Maintain Compliance: Delve into the essentials of ensuring your cloud storage data stays compliant with your security policies.If you want to ensure your data doesn’t end up on a wild adventure, this webinar will equip you with the tools and tricks to keep your cloud storage secure and your data firmly in check.
Topics:
- Public file sharing
- External sharing: implicit/explicit shares
- Compliance: Cloud data discovery -
Mastering SSE | Email Eavesdroppers: Keeping Your Messages Private
Dan Feller, Principal Technical Marketing Manager, Lookout
In a world where email is a channel for confidential communication, safeguarding your messages from prying eyes is crucial. If you’re tired of worrying about who’s peeking at your emails or if your attachments are wandering off without your permission, this webinar is your digital bodyguard, ready to swoop in and save the day!
In this session, you'll discover how to:
- Mask Confidential Information: Learn the art of email sleight-of-hand! We’ll show you how to keep the sensitive info within your messages hidden from prying eyes
- Remove Unauthorized Recipients: Become a master of email bouncers! Find out how to kick out those unwanted guests from your email threads, ensuring only the right people are in the loop.
- Encrypt Attachments: Arm your attachments with high-tech security! We’ll teach you how to encrypt your files so they stay sealed tight, making sure only the right eyes can see them.Don’t let your emails become an open book! Join us to boost your email security skills and turn your inbox into a fortress of confidentiality. With our tips and tricks, you’ll keep your messages private and your mind at ease.
-
The Great Remote Work Data Heist: How to Keep Your Info Secure
Dan Feller, Principal Technical Marketing Manager, Lookout
In the wild frontier of remote work, your data is the prized loot everyone’s after. As the digital outlaws get bolder, ensuring your information stays locked up and safe is more crucial than ever. Saddle up and join us for a showdown on how to protect your virtual gold from the bandits of the information age!
In this high-stakes webinar, you’ll learn how to:
- Clientless Access: Discover how to control access to your SaaS and private apps without the need for client-side installations, keeping the outlaws from sneaking in through the back door.
- Device Posture Checks: Learn how to assess and enforce device security standards, ensuring only the most secure contraptions get access to your stash.
- Data Protection: Master the art of masking, encrypting, and decrypting sensitive data, so even if someone manages to make off with them, the loot remains locked in your treasure chest.Gear up to defend your digital frontier and keep your data from falling into the wrong hands. This webinar is your chance to outwit the modern-day desperadoes and keep your remote work secure. Don’t let the outlaws run off with your digital gold—join us and secure your digital ranch!
-
The Cloud Chaos Caper: Reining In Your Rogue Shadow IT Apps
Dan Feller, Principal Technical Marketing Manager, Lookout
In the enigmatic world of cloud computing, shadow IT apps are elusive phantoms, slipping through the cracks and creating a web of confusion. If you're finding your digital landscape overrun with these mysterious intruders, join us as we unravel the secrets of how to detect, control, and secure your cloud environment.
In this suspenseful webinar, you’ll embark on a thrilling investigation to:
- Uncover Shadow IT Mysteries: Learn how to identify the covert apps and services that are operating under the radar. We'll reveal the techniques to expose these hidden culprits before they can wreak havoc.
- Evaluate and Block High-Risk Sites: Delve into the detective work needed to assess and block access to risky sites and applications. Protect your digital realm from the dangers lurking in these uncharted territories.
- Implement DLP to Guard Your Secrets: Discover how to use Data Loss Prevention (DLP) strategies to ensure your sensitive information stays hidden from these unsanctioned apps. Keep your data secure and prevent it from slipping into the wrong apps.Prepare for a dive into the cloud’s shadowy corners as we piece together the puzzle of rogue apps and ensure your data remains protected. Don’t miss this chance to crack the case and secure your cloud environment against digital mysteries and mischief. Join us and solve the cloud chaos caper with expert precision!