Hi [[ session.user.profile.firstName ]]

Mitigate Insider Threats with Open Source Intelligent Security

Join Grant Babb, Proactive Investigations Program manager for Intel IT, as he discusses the impact of insider threats on organizations and the software and best practices Intel has developed to preempt this type of attack. You’ll learn about:
 
·        A new approach to preempting insid
Join Grant Babb, Proactive Investigations Program manager for Intel IT, as he discusses the impact of insider threats on organizations and the software and best practices Intel has developed to preempt this type of attack. You’ll learn about:
 
·        A new approach to preempting insider threats: How we combined business intelligence and behavioral monitoring
·        How Intel IT developed Intel® Pro-I: A new software tool used by Intel to proactively identify potential insider threats that we’re now making freely available through General Public License (GPL)
·        Insider threat personas: Profiles of insiders who—for one reason or another—deliberately compromise IT data and systems
·        The changing security environment: Why the way we work today via mobile and cloud has changed the way we need to approach insider threats
·        The skills you need: The knowledge and expertise you need on staff to mitigate the risk of insider threats and make the best use of this unique approach
 
Also be sure to bring your questions about insider threats for Grant to answer during the moderated question-and-answer portion of the webinar.
Recorded May 24 2012 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Grant Babb, Proactive Investigations Program manager, Intel IT
Presentation preview: Mitigate Insider Threats with Open Source Intelligent Security
Recommended for you:
  • Date
  • Rating
  • Views
  • A major company has been hacked, suffering a data breach. How do companies the size of Sony handle such situations? Various departments, including legal, tech and PR come together to meet with the management and workout a plan on how to handle the crisis. This presentation will focus on both -- companies with a data breach response plan and those without one. We'll shed some light on what the first 24 hours post-breach looks like for a major company.
  • Understanding the cybersecurity posture of vendors, suppliers, and third-parties is now a necessity for businesses in all industries. Yet, many businesses do not have a formalized vendor risk management program. There are multiple components needed to create a comprehensive vendor risk management program. These span governance and control, as well as security controls and technology.

    Join Jake Olcott, VP at BitSight on February 9 as he highlights best practices and industry standards for vendor risk management programs. Attendees will learn:

    - Which frameworks and methodologies can help get you started
    - Vital questions you should be asking your vendors
    - Why continuous monitoring and verifying vendor security is crucial to mitigate cyber risk
  • Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?

    If you answered yes to any of these questions, you need to register for this webcast. You will learn:
    •How to replicate any workloads to Microsoft's global datacenters
    •How to back up data and protect workloads with nearly infinite scalability
    •How to implement a hybrid replication using both cloud and on-premises solutions
    •How to create a backup without needing to buy more tape
    •How to back up your Windows clients (including Windows 10) to remote storage

    Register now to watch live or receive notification when this program is available on-demand.
  • NRF 16 attracted over 33,000 attendees and focused on retail technology, trends, and areas of focus for the coming fiscal year. Hortonworks and Microsoft were visible booth presences, hosting large volumes of visitors. Together, the partnership is uniquely qualified to accelerate retail data collection and management.

    Join Hortonworks VP of Industry Solutions, Eric Thorsen, and Microsoft’s Retail Industry Solutions Director, Shish Shridhar, to learn how Data-Centric Retail Trends can impact your business and how Hadoop can help you gain actionable insight from your data. Understand how your peers are using data to drive new levels of customer centricity, real-time inventory predictions, and personalized marketing. Learn about how consumer goods companies are using Hadoop to gain insight from demand signals and analyze data flow.
  • See how you can get ahead of the new wave of mobile access and security challenges with the newly released Secure Mobile Access 11.3 firmware in this webcast.

    You’ll learn about some of the new features:

    •Dell EMM/DMM integration: SSO with Dell Mobile Workspace container (supports IOS and Android)
    •New Console Management System (CMS)
    •Kerberos Constrained Delegation
    •Clientless access to SharePoint
    •Chrome OS support
    •More HTML 5 clients supported
    •Better control over SSL protocols and Ciphers
  • In this webinar we will explain how DevOps, powered by Chef automation, makes it possible to deliver infrastructure and new features at velocity within the highly regulated world of the UK Government sector.

    Using Chef in conjunction with a platform such as Skyscape Cloud Services, which provides assured cloud services, enables the government sector to deliver software at speed without fear of compromising Official and Official Sensitive data. With a correctly provisioned and tested infrastructure, plus rules that automate rigorous security testing and policy assurance, you can reduce risk, provide a faster route to delivery and help enable DevOps within your organisation.

    Hear from Seth Thomas, DevOps Evangelist at Chef Software and Peter Rossi, Head of Automation at Skyscape Cloud Services on how to automate your infrastructure in a secure cloud environment.

    In addition, Viewdeck Consulting and Synyega will discuss their successes within this market sector, and offer tips on how you too can adopt DevOps practices.
  • The Identity Management market continues to be heavily influenced by several important trends – cloud, mobile, the rise of the user, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. How will these trends continue to impact the identity landscape, and what should organizations do to prepare for it? Join CA Technologies and (ISC)2 on February 4, 2016 at 1:00PM Eastern as we look at the next phase of identity management, and how these and other emerging trends will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Mitigate Insider Threats with Open Source Intelligent Security
  • Live at: May 24 2012 4:00 pm
  • Presented by: Grant Babb, Proactive Investigations Program manager, Intel IT
  • From:
Your email has been sent.
or close
You must be logged in to email this