Fighting Cyberespionage: Protecting Enterprise from the Enemy Outside & Within

Presented by

Keith Lowry, Nuix SVP Threat Intelligence; Chris Pogue, Nuix SVP CyberThreat Analysis; Amie Taal, Cybersecurity Expert

About this talk

The protection of your organization's trade secrets, collected PII data, and confidential matters are your top priority. The same is an attractive asset for thousands of hackers around the world looking to profit or gain a competitive advantage that could damage the integrity and success of your organization’s objectives. In this webinar, join three seasoned cybersecurity experts as they present the trends in cyberespionage and discuss: • What makes organizations vulnerable to cyberespionage • Why cyberespionage activity can vary across industries based on hacking drivers • How a combined security approach that focuses not just on external threat actors but also privileged insiders can help identify spying activity in the enterprise

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13398)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more