A New Threat Emerges—The Super Malicious Insider

Presented by

Rajan Koo, Chief Customer Officer, DTEX Systems and Armaan Mahbod, Director Security and Business Intelligence, DTEX Systems

About this talk

As the Work-From-Anywhere environment continues to evolve, it has given rise to a new persona: the Super Malicious Insider. One with superior technical skills, an in-depth knowledge of common insider threat detection techniques, and the opportunity to cause serious damage to your organization. How do these individuals differ from other malicious insiders, or employees just trying to do their jobs? In our latest threat report, written by the DTEX i3 research team, “2022 Insider Risk Intelligence & Investigations Report: Psycho-Social Behaviors, Remote Work & the Rise of The Super Malicious Insider” we discuss the nuances between an insider risk and an insider threat, why current technology falls short of providing useful data, and how remote work puts organizations at higher risk than ever before. Register now for our upcoming webinar, where you’ll learn: • Insider Risk vs. Insider Threat • How to spot a Super Malicious Insider based on behavioral data and context • Real-world examples discovered through research by the DTEX i3 team • Steps to secure your organization in 2022 and beyond
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (10)
Subscribers (1548)
DTEX Systems helps hundreds of organizations worldwide better understand their workforce, protect their data and make human-centric operational investments. Its Workforce Cyber Intelligence platform brings together UEBA, endpoint DLP, digital forensics, user activity monitoring and insider threat management in one scalable, cloud-native platform. Through its patented and privacy-compliant meta-data collection and analytics engine, the DTEX platform surfaces abnormal behavioral “indicators of intent” to mitigate risk of data and IP loss and make smarter business decisions quickly. The content of this channel is geared towards security teams and their leaders who are looking for the latest research and case studies that will help them tackle today's greatest security challenges.