Video není dostupné.
Omlouváme se.

Everything about Data Classification and DLP Data Loss Prevention By Luv Johar & Akshay Dixit

Sdílet
Vložit
  • čas přidán 18. 06. 2020
  • Everything about Data Classification and DLP Data Loss Prevention By Luv Johar & Akshay Dixit
    Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, commenting, news reporting, teaching, scholarship, and research.
    All these videos are only created for teaching purposes.
    © 2020 Luv Johar
    Please note that - all ISO 27001 documents and standards are completely owned intellectual property & copyright of ISO.
    Disclaimer: All the views and suggestions expressed in these channel videos are personal suggestions of the speakers and are not recommended for use by anyone without any professional guidance and support.
    If you are a beginner in Cyber Security space then these are the list of MUST WATCH VIDEOS for you -
    - Windows server security and windows server hardening series part 1 - • Windows Server Securit...
    - ISO 27001 Commonly asked questions - • ISMS Commonly Asked Qu...
    - ISO 27001 interview questions - • ISMS Interview Questions
    - How to write non conformities in the audit report - • How To Write Non-Confo...
    - Information security officer and information security manager job interview questions - • Information Security O...
    - ISO 27001 ISMS explained in depth - • Luv Johar Breaks Down ...
    - Everything explained about Data Classification and Data Loss Prevention DLP in depth - • Everything about Data ...
    =========================================================================
    List of MUST WATCH VIDEOS in Hindi -
    - Threats and vulnerabilities explained with examples (in Hindi) - • threats and vulnerabil...
    - Annex A Controls Explained (in Hindi) - • annex a controls expla...
    - Gap Analysis Vs Risk Assessment (in Hindi) - • gap analysis vs risk a...
    - How to implement ISO 27001 explained step by step (in Hindi) - • How to Implement ISMS ...
    - How to implement business continuity using ISO 22301 (in Hindi) - • ISO 22301 business con...
    - Disaster recovery sites explained (in Hindi) - • Disaster Recovery Site...
    - How to get ISO 27001 certified (in Hindi) - • how to get ISMS certif... #CyberSecurity

Komentáře • 25

  • @kirandeepkaur7447
    @kirandeepkaur7447 Před 3 lety +3

    Akshay your voice having all answers that you are very confident on your knowledge,concept and enthusiastic way to explain..knowable session :) Luv thanks for explaining things.

  • @eanobah8919
    @eanobah8919 Před 5 měsíci +1

    very helpful, thank you for this

  • @vback4238
    @vback4238 Před 3 měsíci +1

    Awesome session!! I learned a lot.

  • @subro.sengupta
    @subro.sengupta Před rokem +2

    Very informative and high quality content. Akshay's delivery is amazing. I absolutely loved it! Thanks Luv for organising this insightful session. You've have really helped me out!

  • @siricheru
    @siricheru Před 3 lety +1

    Very useful video thanks Akshay

  • @ratnesh12100
    @ratnesh12100 Před 2 lety +1

    Nicely explained.. thanks

  • @cybersecurity90
    @cybersecurity90 Před 2 lety +1

    Perfect Explanation. (y)

  • @devendrapandey3124
    @devendrapandey3124 Před 6 měsíci +1

    Search a lot but get from here

  • @sairamjalli8861
    @sairamjalli8861 Před 3 lety +3

    Does DLP have capabilities like ips, antivirus and threat detection.

    • @cybersecurity90
      @cybersecurity90 Před 2 lety +1

      DLP solutions are not capable of doing mentioned features.

  • @umeshkharat5091
    @umeshkharat5091 Před 2 lety

    Nice

  • @vidhimarkhedkar8208
    @vidhimarkhedkar8208 Před 4 lety +2

    Is there any certification available to become DLP implementor?

    • @luvkashyap
      @luvkashyap Před 4 lety

      Many starting with Security+, CISSP and so on. They all would cover to certain level and depth concepts/fundamental around Data Protection !!

  • @ketansrivastav1923
    @ketansrivastav1923 Před 3 lety +1

    Sir do you have online classes...

  • @honeyjoshi5650
    @honeyjoshi5650 Před 2 lety

    How long does it take for dlp to get triggered?

    • @LearnITSecuritywithLuvJohar
      @LearnITSecuritywithLuvJohar  Před 10 měsíci +1

      The time it takes for a Data Loss Prevention (DLP) system to trigger or respond to a potential data breach or policy violation can vary based on several factors, including the specific DLP solution, the organization's configuration, and the nature of the incident. Here are some key factors that influence the response time of a DLP system:
      Real-Time vs. Periodic Scanning: DLP systems can operate in real-time, where they continuously monitor data in motion, data at rest, and data in use. In this case, triggers can occur almost instantly when a policy violation is detected. However, some DLP systems also perform periodic scans, which may introduce a delay in detection.
      Policy Configuration: The speed of detection depends on how DLP policies are configured. Policies can be set to trigger immediately upon detecting a violation, or they can be configured with thresholds or delays to reduce false positives.
      System Performance: The efficiency and speed of the DLP solution itself can impact response times. Faster and more efficient DLP solutions can detect and respond to violations more quickly.
      Network and Data Volume: The volume of data being monitored can affect response times. If there is a large amount of data to scan, it may take longer to detect policy violations.
      Alert and Notification Configuration: DLP systems can be configured to generate alerts or notifications when a policy violation is detected. The speed at which these alerts are delivered depends on the configuration of alerting mechanisms and notification channels.
      Remediation Actions: The response time can vary based on the remediation actions specified in the DLP policies. For example, if the policy triggers actions like blocking data transmission or isolating a device, the response time may be very rapid. However, actions that require human intervention may introduce delays.
      Incident Investigation: DLP systems often include features for investigating and confirming policy violations. The time it takes to investigate an incident can vary based on the complexity of the case and the availability of personnel to conduct the investigation.
      In summary, DLP systems can be configured to operate in real-time or with specific detection policies and response actions, and their response times can vary accordingly. For critical and sensitive data, organizations may configure DLP systems to provide rapid and immediate responses to policy violations to minimize the risk of data breaches. It's important for organizations to strike a balance between rapid detection and minimizing false positives to ensure the effectiveness of their DLP solution.

  • @186rajput
    @186rajput Před 3 lety +2

    So many ads