How to Accurately Identify Compromised Insiders

Logo
Presented by

Sagi Dulce, Team Lead, Insider Threat Research, Imperva & Carrie McDaniel, Sr. Product Marketing Mgr, Imperva

About this talk

Insider threats have many faces. Your internal users can be careless or flat out malicious; other times, they fall victim to external attackers. Cybercriminals gain access to your network and data by exploiting people on the inside, often by means of social engineering and phishing. Without proactive detection technologies in place, sophisticated attackers exploit insiders and operate under the radar for months. Attend this webinar to: •Learn how to accurately identify insider threats and protect enterprise data •Discover a multi-layered approach to identify compromised users •Gain insight into the latest developments in deception technology
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (177)
Subscribers (65869)
Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises.