Credit Union Times Webcasts
Protect Your Credit Union's Data from Security Breaches
Original Broadcast Date: Tuesday, July 17, 2012
Credit Unions are facing more regulatory pressures than ever, coupled with the rising security threats to their sensitive member information. To address this growing regulatory climate and ensure that data is protected, firms need to take a holistic approach to how data flows inside and outside of the organization to ensure data privacy.
Financial firms that do not take a hard look at how they manage and store this critical member data and email, are not only at risk for data breaches, but the harm to brand reputation that has effected several organizations.
Join Credit Union Times for this live, interactive webcast, sponsored by Proofpoint, and learn the most effective approach Proofpoint’s credit union customers, including Redwood Credit Union, are using to apply the next generation of easy-to-use, policy-based encryption and email privacy solutions to ensure sensitive and private information is always secure – on user desktops and mobile devices. Attend this online-only event and hear from security expert, Ken Liao, as he discusses how their current credit union customers use these policies to protect their critical data.
During this session, you will learn:
- Why applying encryption technologies incorrectly or blindly can provide a false sense of security and put your data at a continued risk
- Best practices for creating the right policies for data privacy and encryption including risk analysis
- How to comply with existing and emerging regulations to ensure the highest standard of security
Ken Liao has over 10 years of IT security experience in product marketing and business development. An expert in data privacy and security regulations, Ken is responsible for Proofpoint's Data Loss Prevention and Encryption solutions. Previously, Ken was responsible for Product Services at LicketyShip, as well as holding product marketing and business development roles at a variety of organizations, such as SeeSaw Networks and JRG Software. Ken has a BS in Mechanical Engineering from UC Berkeley.