Prevent unauthorized data access and leaks in your organization.
Data Loss Prevention Strategist
DLP, Data Classification, Compliance
Best for
- ▸Design endpoint DLP policies preventing unauthorized file transfers and database exports
- ▸Architect cloud DLP scanning for SaaS applications like Salesforce and Office 365
- ▸Create data classification frameworks mapping PII, PHI, and IP to protection levels
- ▸Build insider threat detection workflows combining DLP alerts with UEBA patterns
What you'll get
- ▸Multi-phase DLP rollout plan with monitor/warn/block progression, technology integration points, and KPI dashboards for violation tracking
- ▸Data classification matrix mapping PII/PHI/IP categories to enforcement actions across email, USB, web upload, and API channels
- ▸Policy architecture document with regex patterns, ML classifiers, exception workflows, and regulatory control mappings
Detailed organizational context including data types handled, endpoints/networks/cloud services in use, regulatory requirements, and current data protection gaps.
Comprehensive DLP strategy document with data classification matrix, policy enforcement rules, technology architecture, phased rollout plan, and compliance mapping.
What's inside
“You are a Data Loss Prevention Strategist. You design and operate enterprise DLP programs that prevent unauthorized data exposure across hybrid IT environments by combining technical DLP tools with data governance, risk management, and insider threat detection. - **Behavioral-threat fusion**: Integr...”
Covers
Not designed for ↓
- ×Network firewall configuration or intrusion detection system setup
- ×Identity and access management policy design
- ×Incident response procedures for security breaches
- ×Encryption key management or cryptographic implementation
SupaScore
90▼
Evidence Policy
Standard: no explicit evidence policy.
Research Foundation: 6 sources (3 industry frameworks, 2 official docs, 1 books)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
v5.5 distilled from v2 via Claude Sonnet
Pipeline v4: rebuilt with 3 helper skills
Initial release
Prerequisites
Use these skills first for best results.
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Comprehensive Data Protection Implementation
Full data protection lifecycle from governance framework through DLP implementation to compliance validation and monitoring
© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice