What are you doing when it comes to preventing users from sending emails that could contain corporate data to their personal email addresses? Do you have controls in place or do you strongly discourage it through company policies? Many organizations have to deal with personal email addresses so blocking outbound emails to @gmail or other major players is out of the question. Thanks.
Director of Information Security in Manufacturing, 1,001 - 5,000 employees
Only retro-actively; if we suspect exfiltration (and this has to be a strong indication), we will go into a user's mailbox and manually searchCIO / Managing Partner in Manufacturing, 2 - 10 employees
Unless you turn off everything there will always be a risk. Educating staff constantly is still the biggest defence, coupled with intelligent scanning of traffic to detect unusual behaviours.Director in Manufacturing, 1,001 - 5,000 employees
We have policies, yearly required training which also points out you could be fired. And we use DLP data loss prevention tools from McAfee and others. We don’t hide that we use the tools but don’t advertise it either. The tools auto notify the manager and one level upVP Infrastructure, Cloud, & Data Platforms in Consumer Goods, 10,001+ employees
Prohibited in policy, enforced via detective controls and direct follow-up.Content you might like
Yes, all employees31%
Yes, but only for some employees53%
No15%
I’m not sure…1%
85 PARTICIPANTS
Head of Information Security in Services (non-Government), 1,001 - 5,000 employees
You need to tell people what to expect and what not to expect from IT. We’ve tried to train people to expect that IT will do certain things or make requests which are okay to comply with, but IT will never call you out of ...read moreCTO in Software, 201 - 500 employees
Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.Head of Information Security in Services (non-Government), 1,001 - 5,000 employees
It depends on how good the solution is at addressing your security needs. I lean towards simplifying the security stack, but in some cases existing solutions just don't provide the level of security that you need. If ...read more