Sandeep Pimpale, Technical Architect | Himanshu Dubey, Sr. Director, Engineering
In recent times, dealing with insider threats has become one of the critical aspects of protecting IT assets of any organization. Traditional security measures tend to focus on external threats and are not necessarily capable of identifying an internal threat. As a result, when it comes to data breaches, around 50% of them have been, directly or indirectly, caused by insiders! In fact, it would not be an overstatement to claim that insider threats are bigger danger to organizational security than any external threats.
Insiders have legitimate access to the company’s network and sensitive data, so it is difficult to identify intent behind accessing that sensitive information. This makes it easy, for an Insider to leak the data, either with malicious intent or just by carelessness.
In this session, we will cover:
- What is Insider Threat?
- Types of Insider Threats.
- Insider Threat examples.
- How to protect against an Insider Attack
Sandeep Pimpale, Technical Architect, Quick Heal Technologies Ltd.
Himanshu Dubey, Sr. Director, Engineering, Quick Heal Technologies Ltd.