Catching Insiders: It's a 'People' Problem (Technology Can Help)

“Et tu, Brute? Then fall, Caesar!” A rather famous line from Shakespeare’s Julius Caesar that, whether historically accurate or not, encapsulates the terror and surprise felt at the discovery of an Insider, and serves to highlight the persistence of the problem we refer to as the Insider Threat. There has always been an Insider Threat, the hard question is, why have we not done more about it? Once we understand the ‘why’ and the ‘who’ (who are Insiders, and who are the rest), we can move on to the ‘How’ we are going to find them. In this presentation we will discuss Insider Threats, their varying levels of sophistication, and different ways in which others might use them. We then apply this understanding to enabling discovery. Join us for an interactive presentation, and discussion on this persistent security challenge
Watch Now

Spotlight

Malware has experienced exponential proliferation since it was first discovered in 1984, when there were a mere 12 known instances of malware. In 2015, there were more than 400,000,000 malware instances with over 390,000 new instances of malicious programs discovered every day. For corporations, it is more important than ever to use a multi-pronged approach to preventing malware and virus attacks on their network. By using an anti-malware security kiosk, corporations can significantly improve their cyber security and prevent unwanted invasions into their network.


OTHER ON-DEMAND WEBINARS

Stop Living in the Past: A New Approach to Application Security

Veracode

Information security has not kept pace with the new reality of a software-driven world. Traditional defenses are proving inadequate in this environment. We’ll discuss how organizations should evolve their security strategies as users and applications become the risk focal point.
Watch Now

2016 Malware Year in Review: Tricks, Threats, and Triumphs

PhishMe, Inc

In 2016, the PhishMe Intelligence team saw over 2,500 active threat reports, the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption ransomware.
Watch Now

SIEM Detection & Response Cases

"Before tackling a SIEM project to improve detection and response, learn from these case studies as their scenario likely matches yours. To firebreak your network brings together technologies, processes and people in the right balance across four phases. More than a security point solution or another box, you need to turn craft into a discipline to improve detection and response. Learn from your peers about the following: - Before environment and issues - Transition effort, cost and impact - After environment and benefits - Best practices for managed SIEM - Your network and next steps "
Watch Now

Risk Decisions using Back to the Future predictions of 2014

"Looking back at over 60 future predictions for Info Security in 2014; did they come true and did they help Risk Decisions?"
Watch Now

Spotlight

Malware has experienced exponential proliferation since it was first discovered in 1984, when there were a mere 12 known instances of malware. In 2015, there were more than 400,000,000 malware instances with over 390,000 new instances of malicious programs discovered every day. For corporations, it is more important than ever to use a multi-pronged approach to preventing malware and virus attacks on their network. By using an anti-malware security kiosk, corporations can significantly improve their cyber security and prevent unwanted invasions into their network.

resources