Click the play buttons below to listen to "Learn how to secure your network from data theft from a former CIA officer."
Part A: The changing intellectual property theft landscape
Burgess explains how the IP theft has changed over the past few years. (6:41)
Play now: You must have Adobe Flash Player 7 or above to view this content.See http://www.adobe.com/products/flashplayer to download now. | Download for later: The changing intellectual property theft landscape. • Internet Explorer: Right Click > Save Target As • Firefox: Right Click > Save Link As |
Part B: How networking pros can prevent data theft
Hear what networking professionals need to know to play their part in preventing data theft. (3:10)
Play now: You must have Adobe Flash Player 7 or above to view this content.See http://www.adobe.com/products/flashplayer to download now. | Download for later: How networking pros can prevent data theft • Internet Explorer: Right Click > Save Target As • Firefox: Right Click > Save Link As |
Part C: User engagement as a network security strategy
Burgess lays out the best strategies to keep network and data safe and your users productive. (2:58)
Play now: You must have Adobe Flash Player 7 or above to view this content.See http://www.adobe.com/products/flashplayer to download now. | Download for later: User engagement as a network security strategy • Internet Explorer: Right Click > Save Target As • Firefox: Right Click > Save Link As |
Read more of Burgess' thoughts, and some caveats, in the recent article on network security and user trust, or find more general advice on our network security homepage.
This was first published in October 2008
Network Management Strategies for the CIO