Hi [[ session.user.profile.firstName ]]

Detecting Insider Threats - A Case Study

The insider is the stealth weapon of cyber threats. Insiders, or people posing as insiders, are able to easily penetrate the defenses and operate from within the network as they are trusted with access and privileges to sensitive data. Hijacked credentials allow attackers to circumvent traditional s
The insider is the stealth weapon of cyber threats. Insiders, or people posing as insiders, are able to easily penetrate the defenses and operate from within the network as they are trusted with access and privileges to sensitive data. Hijacked credentials allow attackers to circumvent traditional security systems and pose as insiders, going unnoticed by the organizations security measures. Organizations today are using signature-less behavior modeling solutions to identify these targeted threats and mitigate the risks and exposure from them to the organization's sensitive information.

Join McAfee and Securonix who are leading this transformation in the industry, as they walk through an investigation of a manufacturing company that utilized McAfee and Securonix technology to identify a data breach.
Recorded Jul 31 2012 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
McAfee and Securonix
Presentation preview: Detecting Insider Threats - A Case Study

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Detecting Insider Threats - A Case Study
  • Live at: Jul 31 2012 5:00 pm
  • Presented by: McAfee and Securonix
  • From:
Your email has been sent.
or close
You must be logged in to email this