2021 Data Exposure Report on Insider Risk | Get the report →
  • Partners
    • Technology Partners
    • Reseller Partners
    • Partner Portal
  • Customer Toolkit
  • University
  • Support
Code42 Logo
  • Products
    • Incydr™ Data risk detection and response for insider threat Product Overview right arrow icon
      • Features
      • Detection
      • Investigation
      • Response
      • Use Cases
      • Remote workforce monitoring
      • Departing employee monitoring
      • IP theft detection
      • View All
      • Information
      • Product Plans
      • Deployment
      • Integrations
      • Developer Portal
      • Trust & Security
      • Services
    • CrashPlan Cloud Endpoint data backup & recovery for the enterprise
  • Solutions
    • Insider Risk
    • Data Exfiltration
    • Incident Response
  • Company
    • About
    • News
    • Careers
    • Leadership
  • Resources
    • Resource Center
    • Reports, eBooks, Videos
    • Events & Webinars
    • Customer Stories
    • Product Resources
    • Integrations
    • Developer Portal
    • Trust & Security
    Data Protection: Code42 vs. DLP Leave DLP behind with a better, risk-based approach to protect data. Learn more right arrow icon
  • Blog
  • Get Started
  • Partners
    • Technology Partners
    • Reseller Partners
    • Partner Portal
  • Customer Toolkit
  • University
  • Support

On-Demand Webinar

Why We Don’t Use DLP: The Code42 Security Team Shows Incydr™ Instead

66% of data breaches involve an insider and 73% go undetected for months. And 69% of those organizations who experienced an insider breach had a DLP in place at the time. Why is insider threat on the rise? In spite of heavy investments into DLP or UEBA solutions, the problem is far from solved.

Want to know how to protect your data from insider risk? This webcast will show how Code42 Incydr can do just that. Incydr signals real risk to effectively mitigate file exposure and exfiltration – all without disrupting collaboration.

Thank You!

We Why Don't Use DLP Webinar Preview

In this webinar you will learn how Code42 Incydr:

  • Pinpoints the activity in files, the way they move, and the people who move them that represents the greatest risk
  • Develops an organization-wide view of the vectors by which files move, like browser upload activity, which highlights risks like corporate data attached to personal email
  • Quickly detects inappropriate personal use or link sharing in cloud applications like Dropbox, iCloud, Box, OneDrive and Google Drive, and how Incydr can mitigate these data threats before they become loss incidents

Meet the speakers:

Todd Thorsen, Director of Governance, Risk Mgmt & Compliance, Code42

Todd Thorsen, CISSP, CISM and CIPP/US – is an Information Security leader with more than 10 years of experience in a variety of roles. Todd’s passion for security developed at Target where he led the Enterprise Third Party Security and Privacy team. Currently, Todd is the Director of Information Security, Risk Management and Compliance at Code42 Software, Inc. In addition to his other security and compliance responsibilities, Todd is responsible for leading Code42’s Insider Threat Risk Program.

Austin Wolf, Senior Information Security Analyst, Code42

As a Senior Information Security Analyst at Code42, Austin is focused primarily on maturing the Code42’s Insider Risk Management and Business Continuity/Disaster Recovery Programs. Previously, Austin was with Xcel Energy, where he built out a Vendor Risk Assessment program and assisted in the roll out of their next generation SCADA and electric distribution systems. Austin is an avid camper, cook, and gardener, and enjoys spending time with family, traveling, and taking photographs.

Brandon McHugh, Senior Information Security Analyst, Code42

As a Senior Information Security Analyst at Code42, Brandon is focused on building the Code42 insider threat risk management program and its FedRAMP Authorization process. Prior to Code42, Brandon was a security risk analyst, network security analyst and the IAM Director at the University of MN where he performed risk assessments for the University, designed an RBAC solution and managed its identity management services. Brandon is an avid biker and camper where he enjoys time in the boundary waters canoe area wilderness.

Share with others:

Watch the Webinar!

50,000+ ORGANIZATIONS TRUST CODE42

Code42 logo
Code42 logo

Code42

  • About Code42
  • News + Events
  • Awards
  • Investors
  • Leadership
  • Careers
  • Contact Sales

Learn More

  • Insider Threat Ecosystem
  • Reseller Partners
  • Federal Solutions
  • Higher Education Solutions
  • CrashPlan for Small Business
  • Customer Stories

Support

  • Help Center
  • Code42 University
  • Professional Services
  • Twitter Twitter
  • Facebook Facebook
  • LinkedIn LinkedIn
  • YouTube YouTube
  • Terms of Use
  • Privacy Statement
  • Impressum
© 2021 Code42 Software, Inc. All rights reserved.
Get Started with Incydr™
Contact Salesright arrow icon
We'll have an insider threat expert reach out within 24 hours
Try an Interactive Demoright arrow icon
Take Incydr for a spin in our free sandbox environment
30 Day Free Trial
Try Incydr at no cost for 30 days to quickly uncover your data blindspots.
Start trial now right arrow icon
Explore the deeper functionality of Incydr™
Contact Salesright arrow icon
We'll have an insider threat expert reach out within 24 hours
30 Day Free Trial
Try Incydr at no cost for 30 days to quickly uncover your data blindspots.
Start trial now right arrow icon

This website uses cookies to improve your user experience and to provide content tailored specifically to your interests. Detailed information on the use of cookies on this website, and how you can manage your preferences, is provided in our Cookie Notice. By clicking I Agree or continuing to use this website, you consent to the use of cookies. Learn more.

Code42
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.