SlideShare a Scribd company logo
That Feeling When
Source Code
Walks Out
the Door
Data Loss Protection for
When People Quit.
Odds are you’re suffering a
data loss, leak or theft…
and you don’t even know it.
And it’s right in
front of you.
Employees
are “looking”
The grass is always greener
50%of the labor force is
looking for a new job
HalfOf job seekers have
been at an employer
for less than 1 year
TREND
TREND
More employees
are quitting
Employee quits have risen every
year for the past decade –
totaling 40M in 2018.
1 in 4members of the labor force
quit to go to another job
22.0
23.5
25.1
27.6
30.5
33.7
36.3
38.2
40.0
20
25
30
35
40
2010 2011 2012 2013 2014 2015 2016 2017 2018
Source: U.S. Bureau of Labor statistics
TREND
Quitters
are taking
The brutal truth
60%
70%
66%
of departing employees admit to taking
company data.
of IP theft happens in the 30 days
before an employee announces their
resignation.
of departing employees said they did it
to help them get their next job.
Departing employees are
your single biggest insider
threat to data loss.
24 million people took
data from their previous
employer in 2018.
Why? Because…
Data is more
portable than
ever
Data loss
detection is
lacking
Employee
loyalty is
declining
Employee
quits are
growing
Quitters
are taking
data
We don’t have a departing
employee workflow.
Yet most companies say…
In fact, less than 20% of large
enterprise companies have a
well defined incident response
scenarios for insider threat.
But wait, it gets worse…
It’s a growing
market problem
Correlation or Causation –
it doesn’t really matter
+ Data portability is accelerating
+ Data loss detection is lacking
+ Employee loyalty is declining
+ Employee quits are growing
+ Quitters are taking data
No wonder insider
threat is on the rise
Data Loss Risk
“Surprises”are everywhere!
INSIDE THREATS OUTSIDE THREATS
DEVICE ORGANIZATIONUSER
Tech refresh
Lost/Stolen laptop
Hardware failure
Error / Accidents
Departing employee
High-risk users
Error / Accidents
Departing employee
High-risk users
CYBER
APT
Ransomware
Malware
When it comes to inside
threats, you’re flying blind.
Brutal Truth
DLP can’t stop it.
Just read the headlines.
Brutal Truth
When
Employees
Steal, You're
Trending
prevention will fail.
You’re missing a critical
layer of protection.
Brutal Truth
You don’t know…
data you have whereWhatWhatWhatWhatWhatWhat
WhatWhatWhatWhatWhatWho
WhatWhatWhatWhatWhatWhen
data is leavingWhatWhatWhatWhatWhatWhat
has or had what data
data is leaving
The Root Cause
A data visibility gap
in the security stack.
“Prevention
isn’t enough”
[ the gap ]
Identify Prevent Detect Respond Recover
Data Identification &
Classification
DRM &
Encrypt
Data Loss &
PreventionData
Network Firewall
Next-Gen Firewall
Network DLP
Identity
User
Authentication
Identity & Access Management
(IAM)
Application Cloud Getaways
Cloud Access Security Brokers (CASB)
Integrated DLP (G-mail, O365, etc)
Device
“Legacy Antivirus”
Endpoint AV
“Next-Gen AV”
Endpoint Detection & Response (EDR)
Prevention will fail.
You need fast data loss
detection and response.
Code42 helps make sure
security & IT teams are not
blindsided by data loss when
prevention fails.
We detect insider threats in
near real-time so you can
investigate and respond
before any damage is done. 
Identify Prevent Detect Respond Recover
Data Identification &
Classification
DRM &
Encrypt
Data Loss &
PreventionData
Network Firewall
Next-Gen Firewall
Network DLP
Identity
User
Authentication
Identity & Access Management
(IAM)
Application Cloud Getaways
Cloud Access Security Brokers (CASB)
Integrated DLP (G-mail, O365, etc)
Device
“Legacy Antivirus”
Endpoint AV
“Next-Gen AV”
Endpoint Detection & Response (EDR)
Fills the Gap
Next-Gen
Data Loss Protection
Simple, fast detection
& response to everyday
data loss from
insider threats.
Your departing
employees are
the biggest insider threat.
Brutal Truth
That Feeling When
You Save
the Day-ta
Proudly protect company data.
Fast and simple insider
threat protection.
Departing employees is your single biggest insider threat to data loss.
Last year, 40 Million people changed jobs. 60% of them admit to taking data when they leave and 70% do it 30 days
before they quit. Prevention will fail. Data will get out. 90% of data loss when employees quit goes undetected for
months. By the time you find out about it – the damage is done and you're wrapped up in a lawsuit. Our job is to
make sure you’re not blindsided by it. We provide real time detection and response so you can remediate before
damage is done.
Code42 specializes in next-gen data loss protection. Our Customers know when they are bleeding data when an
employee quits. We help them setup a process to quickly detect employee data theft and take action before it's too
late. Their old employee off boarding process made sure departing employees turned in their badge and laptop. With
Code42, they now make sure employees don’t take company data on the way out.
Learn more about us at www.code42.com

More Related Content

Similar to Data Loss Protection for When People Quit

Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
The Lorenzi Group
 
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
dianadvo
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
ThinAir
 
Addressing insider threats and data leakage
Addressing insider threats and data leakageAddressing insider threats and data leakage
Addressing insider threats and data leakage
Lepide USA Inc
 
Data breach
Data breachData breach
Data breach
Burhan Ahmed
 
Three tools to reduce employee apathy
Three tools to reduce employee apathyThree tools to reduce employee apathy
Three tools to reduce employee apathy
Stephen P. Abbey
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
jayceewong1
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
 
Productivity 3.0
Productivity 3.0Productivity 3.0
Productivity 3.0
The Lorenzi Group
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus
 
Riverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentationRiverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentation
Economic Alliance of Kankakee County
 
DLP.pptx
DLP.pptxDLP.pptx
DLP.pptx
khasim15
 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?
Browne Jacobson LLP
 
2014 State of Backup for SMBs
2014 State of Backup for SMBs2014 State of Backup for SMBs
2014 State of Backup for SMBs
Carbonite
 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
Argyle Executive Forum
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBs
Carbonite
 
Media pro observeit-webinar-slides-behavioral-analytics-just-in-time-training
Media pro observeit-webinar-slides-behavioral-analytics-just-in-time-trainingMedia pro observeit-webinar-slides-behavioral-analytics-just-in-time-training
Media pro observeit-webinar-slides-behavioral-analytics-just-in-time-training
Jay T. Conrad
 
Human Factor on Information Security -- Origin of Information Leakage
Human Factor on Information Security  -- Origin of Information LeakageHuman Factor on Information Security  -- Origin of Information Leakage
Human Factor on Information Security -- Origin of Information Leakage
Toru Nakata
 

Similar to Data Loss Protection for When People Quit (20)

Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 
Addressing insider threats and data leakage
Addressing insider threats and data leakageAddressing insider threats and data leakage
Addressing insider threats and data leakage
 
Data breach
Data breachData breach
Data breach
 
Three tools to reduce employee apathy
Three tools to reduce employee apathyThree tools to reduce employee apathy
Three tools to reduce employee apathy
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Productivity 3.0
Productivity 3.0Productivity 3.0
Productivity 3.0
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
Riverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentationRiverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentation
 
DLP.pptx
DLP.pptxDLP.pptx
DLP.pptx
 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?
 
2014 State of Backup for SMBs
2014 State of Backup for SMBs2014 State of Backup for SMBs
2014 State of Backup for SMBs
 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBs
 
Media pro observeit-webinar-slides-behavioral-analytics-just-in-time-training
Media pro observeit-webinar-slides-behavioral-analytics-just-in-time-trainingMedia pro observeit-webinar-slides-behavioral-analytics-just-in-time-training
Media pro observeit-webinar-slides-behavioral-analytics-just-in-time-training
 
Human Factor on Information Security -- Origin of Information Leakage
Human Factor on Information Security  -- Origin of Information LeakageHuman Factor on Information Security  -- Origin of Information Leakage
Human Factor on Information Security -- Origin of Information Leakage
 

Recently uploaded

Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 

Recently uploaded (20)

Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 

Data Loss Protection for When People Quit

  • 1. That Feeling When Source Code Walks Out the Door Data Loss Protection for When People Quit.
  • 2. Odds are you’re suffering a data loss, leak or theft… and you don’t even know it.
  • 3. And it’s right in front of you.
  • 4. Employees are “looking” The grass is always greener 50%of the labor force is looking for a new job HalfOf job seekers have been at an employer for less than 1 year TREND
  • 5. TREND More employees are quitting Employee quits have risen every year for the past decade – totaling 40M in 2018. 1 in 4members of the labor force quit to go to another job 22.0 23.5 25.1 27.6 30.5 33.7 36.3 38.2 40.0 20 25 30 35 40 2010 2011 2012 2013 2014 2015 2016 2017 2018 Source: U.S. Bureau of Labor statistics
  • 6. TREND Quitters are taking The brutal truth 60% 70% 66% of departing employees admit to taking company data. of IP theft happens in the 30 days before an employee announces their resignation. of departing employees said they did it to help them get their next job.
  • 7. Departing employees are your single biggest insider threat to data loss.
  • 8. 24 million people took data from their previous employer in 2018.
  • 9. Why? Because… Data is more portable than ever Data loss detection is lacking Employee loyalty is declining Employee quits are growing Quitters are taking data
  • 10. We don’t have a departing employee workflow. Yet most companies say…
  • 11. In fact, less than 20% of large enterprise companies have a well defined incident response scenarios for insider threat.
  • 12. But wait, it gets worse…
  • 13. It’s a growing market problem Correlation or Causation – it doesn’t really matter + Data portability is accelerating + Data loss detection is lacking + Employee loyalty is declining + Employee quits are growing + Quitters are taking data No wonder insider threat is on the rise
  • 14. Data Loss Risk “Surprises”are everywhere! INSIDE THREATS OUTSIDE THREATS DEVICE ORGANIZATIONUSER Tech refresh Lost/Stolen laptop Hardware failure Error / Accidents Departing employee High-risk users Error / Accidents Departing employee High-risk users CYBER APT Ransomware Malware
  • 15. When it comes to inside threats, you’re flying blind. Brutal Truth
  • 16. DLP can’t stop it. Just read the headlines. Brutal Truth
  • 18. prevention will fail. You’re missing a critical layer of protection. Brutal Truth
  • 19. You don’t know… data you have whereWhatWhatWhatWhatWhatWhat WhatWhatWhatWhatWhatWho WhatWhatWhatWhatWhatWhen data is leavingWhatWhatWhatWhatWhatWhat has or had what data data is leaving
  • 20. The Root Cause A data visibility gap in the security stack. “Prevention isn’t enough” [ the gap ] Identify Prevent Detect Respond Recover Data Identification & Classification DRM & Encrypt Data Loss & PreventionData Network Firewall Next-Gen Firewall Network DLP Identity User Authentication Identity & Access Management (IAM) Application Cloud Getaways Cloud Access Security Brokers (CASB) Integrated DLP (G-mail, O365, etc) Device “Legacy Antivirus” Endpoint AV “Next-Gen AV” Endpoint Detection & Response (EDR)
  • 21. Prevention will fail. You need fast data loss detection and response.
  • 22. Code42 helps make sure security & IT teams are not blindsided by data loss when prevention fails.
  • 23. We detect insider threats in near real-time so you can investigate and respond before any damage is done. 
  • 24. Identify Prevent Detect Respond Recover Data Identification & Classification DRM & Encrypt Data Loss & PreventionData Network Firewall Next-Gen Firewall Network DLP Identity User Authentication Identity & Access Management (IAM) Application Cloud Getaways Cloud Access Security Brokers (CASB) Integrated DLP (G-mail, O365, etc) Device “Legacy Antivirus” Endpoint AV “Next-Gen AV” Endpoint Detection & Response (EDR) Fills the Gap Next-Gen Data Loss Protection Simple, fast detection & response to everyday data loss from insider threats.
  • 25. Your departing employees are the biggest insider threat. Brutal Truth
  • 26. That Feeling When You Save the Day-ta Proudly protect company data. Fast and simple insider threat protection.
  • 27. Departing employees is your single biggest insider threat to data loss. Last year, 40 Million people changed jobs. 60% of them admit to taking data when they leave and 70% do it 30 days before they quit. Prevention will fail. Data will get out. 90% of data loss when employees quit goes undetected for months. By the time you find out about it – the damage is done and you're wrapped up in a lawsuit. Our job is to make sure you’re not blindsided by it. We provide real time detection and response so you can remediate before damage is done. Code42 specializes in next-gen data loss protection. Our Customers know when they are bleeding data when an employee quits. We help them setup a process to quickly detect employee data theft and take action before it's too late. Their old employee off boarding process made sure departing employees turned in their badge and laptop. With Code42, they now make sure employees don’t take company data on the way out. Learn more about us at www.code42.com