Special Webinar Event Retail Security Essentials: Strategic Vendor and Data Risk Management

Featuring

  • FireMon
  1. Keith Ward

    Host Keith Ward Webinar Moderator, ActualTech Media

  2. Lisa Wallace

    Featuring Lisa Wallace Senior Security Advisor, FireMon

WIN A $250 Amazon Gift Card

REGISTER NOW & YOU COULD WIN A $250 Amazon.com Gift Card!

Must be in live attendance to qualify. Duplicate or fraudulent entries will be disqualified automatically.

About This Webinar

Designed specifically for cybersecurity professionals in the retail sector, this webinar will delve into critical aspects of network security, focusing on comprehensive strategies to safeguard against vendor-related vulnerabilities, prevent data breaches, protect personally identifiable information (PII), and mitigate intellectual property theft.

Presented by Lisa Wallace, FireMon Senior Security Advisory, this webinar will equip you with the knowledge to implement robust security policies and practices, ensuring your retail organization remains resilient against evolving cybersecurity threats.

Key Topics Include:

  1. PII Protection and Compliance: With stringent regulations like GDPR and CCPA in play, we’ll guide you through the complexities of compliance and how to avoid hefty fines and legal repercussions by safeguarding PII effectively.
  2. Vendor Management: Understand the mechanisms through which vendors access your network and the necessary compensating controls to secure these entry points. We’ll explore effective monitoring practices and how access control lists can be optimized to enhance security in daily operations.
  3. Data Breach Prevention: Review the consequences of data breaches involving customer data and payment details, including financial, legal, and reputational impacts. We’ll provide insights into proactive measures that can minimize the likelihood and impact of these breaches.
  4. Intellectual Property Security: Discover strategies to detect and prevent the exfiltration of critical business information by internal and external threats. Focus will be on both ingress and egress monitoring techniques to secure your intellectual assets.