Insider threats - whether they are current or former employees, contractors or partners with access to company systems or data who use that access maliciously or unintentionally - account for 60 percent of cyber attacks.
Insider threats are difficult to detect, and in many cases they can go unnoticed for months or years. In fact, detecting an internal threat is one of most difficult and ungrateful tasks for security teams in the organization.
Join this panel of security experts as they discuss insider threat hunting techniques and recommendations for safeguarding the enterprise against internal and external threats.
- Why are insider threats so dangerous
- Technical and human factor challenges
- How to detect and prevent malicious insider activity
- How to keep the biggest threats to your organization at bay
Speakers:
Shawn Fleury, Director of Risk Management, The Crypsis Group
Gabe Gumbs, Chief Innovation Officer, Spirion
Sai Chavali, Sr Product Marketing Manager, Proofpoint Insider Threat Management
Lisa Plaggemier, Chief Strategy Officer, MediaPRO
RecordedAug 3 202059 mins
Your place is confirmed, we'll send you email reminders
Diana Kelley (Microsoft), Brandon Hoffman (Netenrich), Jack Mannino (nVisium) & Mike Weber (Coalfire)
Cybercrime is on the rise and organizations of all sizes are vulnerable to attacks. With the proliferation of network-connected devices, applications, and ever-evolving complex network architectures, managing your organization's networks is becoming increasingly more difficult.
Join this panel of network security experts and industry leaders to learn more about:
-Trends in cyber attacks and common attack vectors
- How to identify security gaps in your network
- How to close these gaps: best practices and solutions
- Recommendations for managing and securing complex enterprise networks
Speakers:
Diana Kelley, Cybersecurity Field CTO, Microsoft
Brandon Hoffman, CISO, Head of Security Strategy, Netenrich
Jack Mannino, CEO at nVisium
Mike Weber, Vice President Innovation, Coalfire
Shawn Fleury (Crypsis Group), Gabe Gumbs (Spirion), Sai Chavali (Proofpoint), Lisa Plaggemier (MediaPRO)
Insider threats - whether they are current or former employees, contractors or partners with access to company systems or data who use that access maliciously or unintentionally - account for 60 percent of cyber attacks.
Insider threats are difficult to detect, and in many cases they can go unnoticed for months or years. In fact, detecting an internal threat is one of most difficult and ungrateful tasks for security teams in the organization.
Join this panel of security experts as they discuss insider threat hunting techniques and recommendations for safeguarding the enterprise against internal and external threats.
- Why are insider threats so dangerous
- Technical and human factor challenges
- How to detect and prevent malicious insider activity
- How to keep the biggest threats to your organization at bay
Speakers:
Shawn Fleury, Director of Risk Management, The Crypsis Group
Gabe Gumbs, Chief Innovation Officer, Spirion
Sai Chavali, Sr Product Marketing Manager, Proofpoint Insider Threat Management
Lisa Plaggemier, Chief Strategy Officer, MediaPRO
Terence Jackson (Thycotic), Tim Bach (AppOmni), Michelle McLean (StackRox) & Thomas Hatch (SaltStack)
Organizations continue to grapple with security challenges associated with running applications in the cloud and on-premise. In today's multi-cloud world, applications are deployed on not just one cloud provider, but across multiple cloud providers. This brings extra complexity, especially in the context of avoiding cloud configuration mistakes, controlling access and authentication, as well as scanning for vulnerabilities.
Join industry cloud leaders and security experts for a Q&A roundtable discussion on strategies for improved cloud security and to learn more about:
- Biggest challenges for cloud security
- Cloud misconfiguration and how to avoid common mistakes
- Cloud vulnerability scanning
- Digital identity, authentication and cloud access
- How to continue offering your customers and users the agility they have come to expect employing data protection measures
- Recommendations for CISO for improving cloud security in 2020 and beyond
Speakers:
Terence Jackson, Chief Information Security Officer, Thycotic
Tim Bach, Vice President of Engineering, AppOmni
Michelle McLean, Vice President of Marketing, StackRox
Thomas Hatch, Founder and CTO, SaltStack
The 2020 cyber threat landscape has changed drastically just over the last few months as some employees are mandated to work from home, and others are starting to go back in to the office. But throughout the changes, how you can ensure business continuity while keeping your end users protected?
Join Proofpoint's experts Tim Choi, VP of Product Marketing, and Nathan Chessin, VP of Americas Technical Sales Engineering, as they discuss how you can keep users connected to the data and systems they need to do their job, without compromising how you protect your organization's most valuable assets.
Speakers:
Nathan Chessin, VP of Americas Technical Sales Engineering, Proofpoint
Tim Choi, VP of Product Marketing at Proofpoint
The right to be forgotten—part of the GDPR that allows people to have negative private information removed from Internet searches and directories—is seen by many as a victory for data privacy. To others, it’s burdensome and unworkable. After all, how can you be sure you’ve “forgotten” someone without retaining any information about the person you’ve forgotten?
Join this exclusive virtual interview with Gabe Gumbs, Chief Innovation Officer of Spirion during Black Hat to make sense of GDPR’s most notorious provision and learn more about:
- The paradox of the right to be forgotten
- Data Subject/Consumer Rights under GDPR and CCPA
- What are data inventories and how to leverage them to fulfill compliance requirements
- Why you need great data discovery and identification in order to have data privacy
- How businesses are handling increasing privacy and security concerns in the COVID19 / remote working era
- Recommendations for improving data privacy and security
Insider Threats and Hunting the Enemy WithinShawn Fleury (Crypsis Group), Gabe Gumbs (Spirion), Sai Chavali (Proofpoint), Lisa Plaggemier (MediaPRO)[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]59 mins