Menu

Seminar

Cloud Security & IDAM Theatre

Thu 6th Oct 12:20 to 12:50

The Threat from Within: Data Breaches are an Inside Job

Data shows that almost all data breaches involve a trusted insider. In some cases this is an intentionally malicious insider out to further their own ends. In other cases it may be an insider compromised by a cybercriminal. This session will explore the different ways insiders are involved in data breaches and why traditional security controls prove so ineffective against the “threat from within”. Based upon this, attendees will learn:
•How different technologies do, and don’t, identify indicators of insider abuse
•How to avoid “SIEM alert overload” and minimize false positives
•The advantages of a data centric approach for identifying insider threats

What you will take away from this session

  • Learn how different technologies do and don't identify indicators of insider abuse
  • Learn how to avoid "SIEM alert overload" and minimize false positives
  • Discover the advantages of a data centric approach for identifying insider threats

Speakers

Photo Speaker Name Profile
Morgan Jay Morgan Jay View Profile

Social Media

Twitter

Linkedin

IP EXPO | LinkedIn

The home of IP EXPO Event Series

Facebook