Insider Threats - How to Prevent, Detect and Re-mediate Insider Attacks

Join our webinar "Insider Threats - How to Prevent, Detect and Remediate Insider Attacks" as we discuss insider threats and what cybersecurity professionals are doing to prevent, detect and remediate them. We will also review the key findings of the 2015 Insider Threat Report, including: • 62 percent of security professionals say insider threats have become more frequent in the last 12 months. But only 34 percent expect additional budget to address the problem. • Fewer than 50 percent of organizations have appropriate controls to prevent insider attacks. • 62 percent of respondents say that insider attacks are far more difficult to detect and prevent than external attacks. Panelists: Zach Lindquist (Sergeant Laboratories), David Thornbury (Watchful Software), Mike Tierney (SpectorSoft), John Yun (Palerra), Matt Zanderigo (ObserveIT)
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

2022 SANS Survey: State of Cloud Security in the Enterprise

More and more enterprises have moved their infrastructure and operations to the cloud than ever before. Along with these changes, we have also seen a significant change in enterprise security posture and use of technology. However, what does that change look like? How have security teams kept up with the change? Just what is the state of cloud security in the enterprise?
Watch Now

Draft and Develop: A Solution to the Cyber Security Skills Shortage

Security Boulevard

By 2019, the nonprofit group ISACA predicts a global shortage of two million cyber security professionals. Security can no longer work in a silo-- they now need to communicate across the business and balance the needs of multiple stakeholders from product line managers to ops teams. Outreach’s CISO, Martin Rues, knew finding a candidate with the combination of DevOps, Security and Cloud would be a time-consuming exercise with low yield. He decided to invest in his teams and create an apprenticeship program to “draft and develop” internal talent, and groom then into the Cloud SecOps role that we required. Join Martin on July 26th at 1pm EDT to learn how he developed the apprenticeship program to build internal cloud security talent.
Watch Now

Key Steps to Identify Risk & Master Vendor Risk Management

BitSight

In today’s interconnected technology ecosystem, companies increasingly rely on third-party vendors to meet their operational needs. However, the current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte, 83% of today’s business leaders lack confidence in third-party VRM processes. Understanding and managing cyber risk posed by vendors, suppliers, and third parties has proven to be a difficult task. The right mix of people, processes, and technology result in the most effective and comprehensive program.
Watch Now

Identify Early Warning Indicators with Managed Detection and Response

Join Vectra’s Director of Consulting Analysts Jonathan Barrett on 22 June 2022 at 8 AM PDT I 17:00 CEST as he explains how Sidekick MDR finds early warning signs of malicious activity and enhances the built-in learning.
Watch Now