The Anatomy of an Insider Attack: Exploiting Encrypted Networks

Presented by

Samuli Siltanen, Vice President EMEA, SSH Communications Security

About this talk

With recent, high profile breaches in some of the most secure environments in the world (DoD, NSA) the ability of trusted insiders to do extensive damage to an organization's data, capabilities and reputation is now front and center. In this webinar we will look into how a lack of access controls, monitoring, auditing and forensics in encrypted networks has left organizations such as banks, retailers, insurance companies, government agencies and many more at significant risk. What we will cover in this webinar: The problem is bigger than you think: Current state analysis of F500 organizations with real world case studies How a lack of access controls in encrypted networks creates security and compliance issues How encryption thwarts security intelligence capabilities and how to remedy this The anatomy of an insider attack: Exploiting encrypted networks How to solve the problem o Size/Scope Discovery o Access Control Remediation o Centralized Management o Continuous Monitoring o DLP enablement o Forensics

Related topics:

More from this channel

Upcoming talks (20)
On-demand talks (3501)
Subscribers (180292)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.