Hi [[ session.user.profile.firstName ]]

Mitigate Insider Threats with Open Source Intelligent Security

Join Grant Babb, Proactive Investigations Program manager for Intel IT, as he discusses the impact of insider threats on organizations and the software and best practices Intel has developed to preempt this type of attack. You’ll learn about:
 
·        A new approach to preempting insid
Join Grant Babb, Proactive Investigations Program manager for Intel IT, as he discusses the impact of insider threats on organizations and the software and best practices Intel has developed to preempt this type of attack. You’ll learn about:
 
·        A new approach to preempting insider threats: How we combined business intelligence and behavioral monitoring
·        How Intel IT developed Intel® Pro-I: A new software tool used by Intel to proactively identify potential insider threats that we’re now making freely available through General Public License (GPL)
·        Insider threat personas: Profiles of insiders who—for one reason or another—deliberately compromise IT data and systems
·        The changing security environment: Why the way we work today via mobile and cloud has changed the way we need to approach insider threats
·        The skills you need: The knowledge and expertise you need on staff to mitigate the risk of insider threats and make the best use of this unique approach
 
Also be sure to bring your questions about insider threats for Grant to answer during the moderated question-and-answer portion of the webinar.
Recorded May 24 2012 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Grant Babb, Proactive Investigations Program manager, Intel IT
Presentation preview: Mitigate Insider Threats with Open Source Intelligent Security
Recommended for you:
  • Date
  • Rating
  • Views
  • Josh Downs, BrightTALK's Information Security Community Manager breaks down 3 must-watch webinars from February's Data-driven Security Summit:

    3. Business-lead and Threat-Focused Cyber Risk Management - Chris Verdonck, Global Cyber Strategy & Peter Wirnsperger, Cyber Risk Services, Deloitte

    2. Making Vulnerability Management Sexy, Again! - Amar Singh, Chair of ISACA's UK Security Advisory Group

    1. (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success - Nik Whitfield, CEO, Panaseer

    To attend any of the above, see the URLs in the attachments.

    For more insights, follow Josh on @BrightTALK_Josh
  • Josh Downs, BrightTALK's Information Security Community Manager breaks down 3 must-watch webinars from February's Data-driven Security Summit:

    3. Business-lead and Threat-Focused Cyber Risk Management - Chris Verdonck, Global Cyber Strategy & Peter Wirnsperger, Cyber Risk Services, Deloitte

    2. Making Vulnerability Management Sexy, Again! - Amar Singh, Chair of ISACA's UK Security Advisory Group

    1. (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success - Nik Whitfield, CEO, Panaseer

    To attend any of the above, see the URLs in the attachments.

    For more insights, follow Josh on @BrightTALK_Josh
  • Josh Downs, BrightTALK's Information Security Community Manager breaks down 3 must-watch webinars from February's Data-driven Security Summit:

    3. Business-lead and Threat-Focused Cyber Risk Management - Chris Verdonck, Global Cyber Strategy & Peter Wirnsperger, Cyber Risk Services, Deloitte

    2. Making Vulnerability Management Sexy, Again! - Amar Singh, Chair of ISACA's UK Security Advisory Group

    1. (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success - Nik Whitfield, CEO, Panaseer

    To attend any of the above, see the URLs in the attachments.

    For more insights, follow Josh on @BrightTALK_Josh
  • Josh Downs, BrightTALK's Information Security Community Manager breaks down 3 must-watch webinars from February's Data-driven Security Summit:

    3. Business-lead and Threat-Focused Cyber Risk Management - Chris Verdonck, Global Cyber Strategy & Peter Wirnsperger, Cyber Risk Services, Deloitte

    2. Making Vulnerability Management Sexy, Again! - Amar Singh, Chair of ISACA's UK Security Advisory Group

    1. (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success - Nik Whitfield, CEO, Panaseer

    To attend any of the above, see the URLs in the attachments.

    For more insights, follow Josh on @BrightTALK_Josh
  • Rejoignez ce webcast pour découvrir comment anticiper les nouveautés de l’accès mobile et les défis de sécurité avec le nouveau firmware Secure Mobile Access 11.3.

    Nouvelles fonctions :

    •Intégration Dell EMM/DMM : SSO avec conteneur Dell Mobile Workspace (iOS et Android pris en charge)
    •Nouvelle console CMS (Console Management System)
    •Délégation Kerberos contrainte (délégation KCD)
    •Accès sans client à SharePoint
    •Prise en charge de Chrome OS
    •Plus de clients HTML 5 pris en charge
    •Contrôle amélioré des protocoles SSL et Ciphers
  • BYOD poses a curious challenge for security teams – how can you secure enterprise data on a device that you don’t own? And how can you provide the necessary security while still respecting the user’s expectations for privacy? These issues aren’t easily addressed with traditional technology, leading many organizations to a frustrating problem for securing BYOD.

    Join Palo Alto Networks and VMware AirWatch in this special webinar to learn:

    · The security challenges with BYOD
    · The issues and limitations with traditional security architectures in a mobile world
    · Advice on delivering the appropriate security measures to make BYOD safe
  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data
  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data
  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data
  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Mitigate Insider Threats with Open Source Intelligent Security
  • Live at: May 24 2012 4:00 pm
  • Presented by: Grant Babb, Proactive Investigations Program manager, Intel IT
  • From:
Your email has been sent.
or close
You must be logged in to email this