Protecting Against Insider Threat in 2020

Logo
Presented by

Shareth Ben, Securonix & Joseph Blankenship, Forrester

About this talk

In the past few years, Insider Threat has evolved in several aspects from how sensitive data leaves the organization to ways in which privilege access gets misused, creating risks for organizations to mitigate. The proliferation of cloud applications had made tracking and protecting sensitive data extremely challenging. Add to this the current remote work setup in the midst of COVID-19, and one can imagine how hard it is to track, monitor, and protect your crown jewels. Insider threats can originate from malicious insiders or insiders that are simply negligent and do not follow best practices. Insider threats can also originate from compromised accounts that are controlled by an outsider. Given all the scenarios, monitoring solutions are forced to curate use cases in conjunction with purpose-built detection techniques in order to derive specific outcomes to be effective in detecting infractions. This shift in behavior is becoming more evident as organizations ramp up visibility into how its employees and contractors use their assets and resources over time. Join Shareth Ben (Executive Director, Insider Threat &Cyber Threat Analytics, Securonix) and featured speaker Joseph Blankenship (Vice President, Research Director, Security & Risk, Forrester) to gain some insights into: • How Insider Threat has evolved over time and the new challenges it presents. • What are some of the most common Insider Threat behaviors observed in the field? • Which detection techniques are effective in detecting nefarious behaviors within the organization? • Walkthrough of the key trends and observations from the Securonix 2020 Insider Threat Report.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (80)
Subscribers (16878)
Securonix Next-Gen SIEM delivers threat detection and response powered by flexible, cloud-native advanced analytics. Follow this channel to learn from our security experts. They will discuss threat trends, detection techniques, and SecOps topics such as cloud security, insider threat, SIEM, UEBA, and SOAR.