Uncovering the Cyber-Wolf in Sheep’s Clothing: User Behavior Analytics Insights

Presented by

Bernd Leger, VP Marketing, CloudLock; Andras Cser, VP and Principal Analyst, Forrester

About this talk

Forrester estimates that 200-220 million phishing emails are sent out every day. As cybercriminals continue using these tactics to hijack credentials, differentiating between the good and the bad guys becomes a challenge. Detecting behavioral anomalies could mean the difference between halting a cybercriminal in their tracks and becoming yet another victim. Watch this webinar to learn from our VP of Marketing, Bernd Leger, and guest speaker, VP & Principal Analyst, Andras Cser: – Why cloud users are the new threat vector for cyber-attacks. – What account compromises look like and why they are so scary. – What user behavior analytics means for the security of your organization’s most precious assets. – Concrete recommendations of what you should look for and do to avoid them.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13394)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more