Network and security devices that provide control mechanism for Data Leakage Prevention can encounter malfunction due to improper configuration and/or unavailability of functionality. Lack of co-ordination between professionals from Information Systems, IT Security, Data Security, Risk Management,Network Operations and Forensics which possess risk to organisation to understand the risk treatment against Data Leakage by understanding the data available in organisation and mediums of data transfer in environment which may include the mediums on computing devices, visual,networking devices and data entry & extraction tools.
To support the professionals we have worked on discovering and researching on latest Top 15 breaches of controls that results in Data Leakage.