Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Taking Insider Risk Management to the Next Level Shunta Sharod Sanders Insider threats can hang out in your network for months undetected, with the cost for mitigation rising exponentially. In fact, on average, incidents ... 3 months ago | 21 mins Improving Contextual Analysis for Protecting Organizations from Insider Threats Robert A. Davidson, Insider Threat Manager at Dominion Energy & Sanjay Raja, VP Product Marketing and Solutions at Gurucul As insider threats have started to escalate in recent years, it is even more important to build and implement a successful insider threat program. How... June 15, 2023 6:00pm Cyber Notes Cast - The Main Types of Cyberattacks in Cloud Environments senhasegura Cloud services facilitate the routine of companies and optimize their productivity, especially in the context of remote work. However, they can presen... 1 day ago | 6 mins The Looming Threat of Forever Chemicals Insider Engage Insurance and risk management professionals picked PFAS or “forever chemicals” as their top concern in Verisk’s 2023 Emerging Issues Bracket Challenge... June 28, 2023 2:30pm The 2023 SaaS Security Threat Landscape Data Report Webinar Presenters: Tim Davis, Head of Solutions Engineering; Corey O’Connor, Director of Product Marketing DoControl recently released the latest findings in what will be an annual data report on Software as a Service (SaaS) security risk. The 2023 SaaS Sec... 4 weeks ago | 38 mins [APAC] The Ex(filtrated) Files: How to Reduce Insider Risk to Your Organization Joanne Wong, LogRhythm International VP Data exfiltration is not new, but a resurfacing risk factor to businesses all over the globe. According to Ponemon Institute's 2022 Cost of Insider... 1 month ago | 13 mins Top 4 Trends for the SOC Sanjay Raja, VP Product Marketing and Solutions, Gurucul The SOC is in a never-ending race to collect and analyze data to make better decisions. Many factors can positively or negatively impact their success... 1 week ago | 31 mins When Employees Depart: Ensuring Access to Sensitive Data is Removed Kale Bogdanovs & Rob Frase When employees leave your organization, how sure are you that they are actually gone? It’s easy to deactivate in AD or SSO, but that doesn’t percolat... 2 weeks ago | 22 mins The ROI of a SaaS Security Program Corey O'Connor, Product Marketing Manager, DoControl; Matt Dubreuil, Revenue Operations Manager, DoControl As SaaS environments become more complex and fragmented, the attack surface expands, and security becomes overwhelmingly burdensome. IT and Security t... 2 weeks ago | 24 mins Stopping Privilege Escalation In The Cloud With Least Privilege Alba Ferri, Senior Product Marketing Manager, Sysdig and Yathi Naik, Technical Lead Manager, Sysdig In today's world, data breaches and insider threats are becoming increasingly common, and controlling access to sensitive information is crucial for o... 1 month ago | 48 mins Load more