Thursday, September 27, 2018 at 11 AM ET

 
More than a few cyberattacks are being launched by insiders and with these employees, contractors and partners already having access to the network, perimeter security becomes essentially worthless against these onslaughts. 
 
Recognizing an insider whose behavior is abnormal or simply identifying an internal user who is acting in a matter that goes against normal behavior — perhaps a legitimate user's credentials have been compromised and that user now actually is an outside attacker — can help the security team identify potential threats early on.
 
In addition to identifying anomalous behavior in your network, teams can also establish response plans that might involve other professionals — from HR to external entities, such as law enforcement, to help determine both tactical responses and the implementation of future strategies. 
 
A recent Ponemon Institute report pegs the average cost of an insider threat for an organization at $8 million annually. Can your company survive insider attacks?
 
Today’s virtual conference looks at the technologies and over-arching plans needed to handle insider attacks, in addition to providing some ideas for training up staff to support these initiatives.
More than a few cyberattacks are being launched by insiders and with these employees, contractors and partners already having access to the network, perimeter security becomes essentially worthless against these onslaughts. 


Recognizing an insider whose behavior is abnormal or simply identifying an internal user who is acting in a matter that goes against normal behavior — perhaps a legitimate user's credentials have been compromised and that user now actually is an outside attacker — can help the security team identify potential threats early on.

In addition to identifying anomalous behavior in your network, teams can also establish response plans that might involve other professionals — from HR to external entities, such as law enforcement, to help determine both tactical responses and the implementation of future strategies. 

 

Presenter
Ronald E Plesco
Principal, Cyber Response Services
KPMG
View Biography
Presenter
Julie Cullivan
Chief Information Officer and Senior Vice President
ForeScout
Presenter
Nir Gertner
Chief Security Strategist
CyberArk

Registration details:

By registering you are accepting our Privacy Policy and Terms of Use.

Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.

(*) denotes required form field(s)

Submit