Menu

Company Profile

Imperva is a leading provider of cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, CounterBreach,Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations. Learn more: www.imperva.com.

Imperva Seminars

  • The Threat from Within: Data Breaches are an Inside Job Morgan Gerhart  |   Imperva   |   Wed 5th Oct 15:40 - 16:10

    Future of Threat Intelligence Theatre

    Wed 5th Oct 15:40 to 16:10

    The Threat from Within: Data Breaches are an Inside Job

    Data shows that almost all data breaches involve a trusted insider. In some cases this is an intentionally malicious insider out to further their own ends. In other cases it may be an insider compromised by a cybercriminal. This session will explore the different ways insiders are involved in data breaches and why traditional security controls prove so ineffective against the “threat from within”. Based upon this, attendees will learn:
    •How different technologies do, and don’t, identify indicators of insider abuse
    •How to avoid “SIEM alert overload” and minimize false positives
    •The advantages of a data centric approach for identifying insider threats

    Speaker

    Photo Speaker Name Profile
    Morgan Gerhart Morgan Gerhart View Profile
  • The Threat from Within: Data Breaches are an Inside Job Morgan Jay  |   Imperva   |   Thu 6th Oct 12:20 - 12:50

    Cloud Security & IDAM Theatre

    Thu 6th Oct 12:20 to 12:50

    The Threat from Within: Data Breaches are an Inside Job

    Data shows that almost all data breaches involve a trusted insider. In some cases this is an intentionally malicious insider out to further their own ends. In other cases it may be an insider compromised by a cybercriminal. This session will explore the different ways insiders are involved in data breaches and why traditional security controls prove so ineffective against the “threat from within”. Based upon this, attendees will learn:
    •How different technologies do, and don’t, identify indicators of insider abuse
    •How to avoid “SIEM alert overload” and minimize false positives
    •The advantages of a data centric approach for identifying insider threats

    Speaker

    Photo Speaker Name Profile
    Morgan Jay Morgan Jay View Profile

Social Media

Twitter

Linkedin

IP EXPO | LinkedIn

The home of IP EXPO Event Series

Facebook